The Future of Information Security Research: Cryptology and Beyond View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014-05-15

AUTHORS

Bart Preneel

ABSTRACT

This paper reflects on the state of the art in cryptology and information security. It considers the main achievements and shortcomings of research and identifies the major challenges for the future. It explores which research approaches have a high potential to evolve from academic ideas to practical solutions. The paper concludes by discussing how the deployment of more secure and reliable IT systems requires a complete re-engineering including new architectures; it also sketches the broader societal context of such a redesign. More... »

PAGES

23-27

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-06811-4_5

DOI

http://dx.doi.org/10.1007/978-3-319-06811-4_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1008969296


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Electrical Engineering-ESAT/COSIC, KU Leuven and iMinds, Kasteelpark Arenberg 10 Bus 2452, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "Department of Electrical Engineering-ESAT/COSIC, KU Leuven and iMinds, Kasteelpark Arenberg 10 Bus 2452, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014-05-15", 
    "datePublishedReg": "2014-05-15", 
    "description": "This paper reflects on the state of the art in cryptology and information security. It considers the main achievements and shortcomings of research and identifies the major challenges for the future. It explores which research approaches have a high potential to evolve from academic ideas to practical solutions. The paper concludes by discussing how the deployment of more secure and reliable IT systems requires a complete re-engineering including new architectures; it also sketches the broader societal context of such a redesign.", 
    "editor": [
      {
        "familyName": "Jonker", 
        "givenName": "Willem", 
        "type": "Person"
      }, 
      {
        "familyName": "Petkovi\u0107", 
        "givenName": "Milan", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-06811-4_5", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-06810-7", 
        "978-3-319-06811-4"
      ], 
      "name": "Secure Data Management", 
      "type": "Book"
    }, 
    "keywords": [
      "information security research", 
      "information security", 
      "IT systems", 
      "security research", 
      "new architecture", 
      "cryptology", 
      "practical solution", 
      "shortcomings of research", 
      "major challenge", 
      "security", 
      "architecture", 
      "deployment", 
      "research approach", 
      "redesign", 
      "shortcomings", 
      "art", 
      "main achievements", 
      "challenges", 
      "research", 
      "system", 
      "idea", 
      "solution", 
      "future", 
      "academic ideas", 
      "context", 
      "high potential", 
      "state", 
      "societal context", 
      "achievement", 
      "broader societal context", 
      "potential", 
      "paper", 
      "approach"
    ], 
    "name": "The Future of Information Security Research: Cryptology and Beyond", 
    "pagination": "23-27", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1008969296"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-06811-4_5"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-06811-4_5", 
      "https://app.dimensions.ai/details/publication/pub.1008969296"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:54", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_225.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-06811-4_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-06811-4_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-06811-4_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-06811-4_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-06811-4_5'


 

This table displays all metadata directly associated to this object as RDF triples.

97 TRIPLES      22 PREDICATES      57 URIs      50 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-06811-4_5 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nf07a8ddd61244a54919dbef73875831a
4 schema:datePublished 2014-05-15
5 schema:datePublishedReg 2014-05-15
6 schema:description This paper reflects on the state of the art in cryptology and information security. It considers the main achievements and shortcomings of research and identifies the major challenges for the future. It explores which research approaches have a high potential to evolve from academic ideas to practical solutions. The paper concludes by discussing how the deployment of more secure and reliable IT systems requires a complete re-engineering including new architectures; it also sketches the broader societal context of such a redesign.
7 schema:editor Na3754e41e1c0484ca13de7f7158103df
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf Nc6836f7d0e3149268e200cf10a2cf8fa
11 schema:keywords IT systems
12 academic ideas
13 achievement
14 approach
15 architecture
16 art
17 broader societal context
18 challenges
19 context
20 cryptology
21 deployment
22 future
23 high potential
24 idea
25 information security
26 information security research
27 main achievements
28 major challenge
29 new architecture
30 paper
31 potential
32 practical solution
33 redesign
34 research
35 research approach
36 security
37 security research
38 shortcomings
39 shortcomings of research
40 societal context
41 solution
42 state
43 system
44 schema:name The Future of Information Security Research: Cryptology and Beyond
45 schema:pagination 23-27
46 schema:productId Nd501b25290c349e09440ae410e041eff
47 Nee036d677a5548b6bd0019e0a5d2a39e
48 schema:publisher N2d1cfdeb52014d9788b4be84abde44e6
49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008969296
50 https://doi.org/10.1007/978-3-319-06811-4_5
51 schema:sdDatePublished 2022-10-01T06:54
52 schema:sdLicense https://scigraph.springernature.com/explorer/license/
53 schema:sdPublisher N16d1da4b8beb49b699ee18671329d518
54 schema:url https://doi.org/10.1007/978-3-319-06811-4_5
55 sgo:license sg:explorer/license/
56 sgo:sdDataset chapters
57 rdf:type schema:Chapter
58 N16d1da4b8beb49b699ee18671329d518 schema:name Springer Nature - SN SciGraph project
59 rdf:type schema:Organization
60 N2d1cfdeb52014d9788b4be84abde44e6 schema:name Springer Nature
61 rdf:type schema:Organisation
62 N33914dcbab274add85e570ed0d53be1c schema:familyName Petković
63 schema:givenName Milan
64 rdf:type schema:Person
65 N43bd0a07386b491ba1a1e4ce0c5b9c53 rdf:first N33914dcbab274add85e570ed0d53be1c
66 rdf:rest rdf:nil
67 N7287de669e334e559d41612359139a7a schema:familyName Jonker
68 schema:givenName Willem
69 rdf:type schema:Person
70 Na3754e41e1c0484ca13de7f7158103df rdf:first N7287de669e334e559d41612359139a7a
71 rdf:rest N43bd0a07386b491ba1a1e4ce0c5b9c53
72 Nc6836f7d0e3149268e200cf10a2cf8fa schema:isbn 978-3-319-06810-7
73 978-3-319-06811-4
74 schema:name Secure Data Management
75 rdf:type schema:Book
76 Nd501b25290c349e09440ae410e041eff schema:name doi
77 schema:value 10.1007/978-3-319-06811-4_5
78 rdf:type schema:PropertyValue
79 Nee036d677a5548b6bd0019e0a5d2a39e schema:name dimensions_id
80 schema:value pub.1008969296
81 rdf:type schema:PropertyValue
82 Nf07a8ddd61244a54919dbef73875831a rdf:first sg:person.011115044357.39
83 rdf:rest rdf:nil
84 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
85 schema:name Information and Computing Sciences
86 rdf:type schema:DefinedTerm
87 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
88 schema:name Data Format
89 rdf:type schema:DefinedTerm
90 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.5596.f
91 schema:familyName Preneel
92 schema:givenName Bart
93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
94 rdf:type schema:Person
95 grid-institutes:grid.5596.f schema:alternateName Department of Electrical Engineering-ESAT/COSIC, KU Leuven and iMinds, Kasteelpark Arenberg 10 Bus 2452, 3001, Leuven, Belgium
96 schema:name Department of Electrical Engineering-ESAT/COSIC, KU Leuven and iMinds, Kasteelpark Arenberg 10 Bus 2452, 3001, Leuven, Belgium
97 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...