z-logo
open-access-imgOpen Access
Security: always too much and never enough Anthropology of a non-starter market
Author(s) -
Dominique Boullier,
Pascal Jollivet,
Frédéric Audren
Publication year - 2007
Publication title -
annals of telecommunications
Language(s) - French
Resource type - Journals
SCImago Journal Rank - 0.338
H-Index - 39
eISSN - 1958-9395
pISSN - 0003-4347
DOI - 10.1007/bf03253318
Subject(s) - public key infrastructure , computer security , certification , security through obscurity , key (lock) , architecture , constraint (computer aided design) , reciprocal , ontology , computer science , business , public key cryptography , cloud computing security , security information and event management , encryption , political science , law , engineering , epistemology , cloud computing , art , mechanical engineering , philosophy , visual arts , operating system , linguistics
The security market, based on public Key Infrastructures (pki) did not succeed because security remains a paradoxical market. We observed security practices and reciprocal expectations, in this study the ones generated by the design of pki devices. Using the framework of Actor Network Theory, we describe all the mediations required for sustaining a digital security chain… often based on very material stuff. A whole vision of the world should be designed, an ontology, doomed to failure if it formats practices and users by constraint. This vision should retain a variable-geometry, while calling on guarantors that transcend it, and not merely on commercial certification authorities. Will security architecture design be able to integrate the users’ demand for “adequate security”, which renders security policies bearable as long as users are not aware of them?RésuméLe marchà de la sàcurità basà sur les Public Key Infrastructures (Infrastructure de gestion de clàs) n’est pas parvenu à decoller car la sàcurità reste un marchà paradoxal. Nous avons observà les pratiques de sàcurità et les attentes ràciproques crààes par la conception de ces systàmes, plus spàcifiquement ceux à base de PKI pour cette àtude, dans les termes de la thàorie de l’acteur-ràseau, en reconstituant toutes les màdiations nàcessaires à l’existence d’une chaîne de sàcurità informatique... souvent bien matàrielle. C’est une vision sàcuritaire du monde qui doit être produite, une ontologie, qui àchoue quand elle veut trop formater les pratiques et les utilisateurs: elle doit rester “à gàometrie variable” tout en mobilisant des garants qui la dàpassent et non les seules autoritàs de certification marchandes. La conception d’architectures de sàcurità peut eUe admettre cette “sàcurità suffisante” qui rend supportable les politiques de sàcurità dès lors qu’elles disparaissent de la conscience des utilisateurs?

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom