{"id":296,"date":"2009-04-05T22:50:09","date_gmt":"2009-04-05T22:50:09","guid":{"rendered":"http:\/\/miguelpdl.com\/weblog\/?p=296"},"modified":"2009-04-05T22:50:09","modified_gmt":"2009-04-05T22:50:09","slug":"trust-within-network-enabled-relationships-and-software-security-errors","status":"publish","type":"post","link":"https:\/\/miguelpdl.com\/weblog\/trust-within-network-enabled-relationships-and-software-security-errors\/","title":{"rendered":"Trust within network enabled relationships and software security errors"},"content":{"rendered":"<p>2 reports to mention in this quick post, firstly this <a href=\"http:\/\/www.isoc.org\/isoc\/mission\/initiative\/docs\/trust-report-2008.pdf\">ISOC report [pdf]<\/a> which looks (briefly) at the trust and identity issues that are to tackled on\/for\/with the Internet. The key point I took from it is that we should &#8220;incorporate trust as a core element of the Internet design and deployment process&#8221; and in doing so we should look at<br \/>\nWhat are the alternative futures for trust and the Internet?<br \/>\nWhere do you see the boundaries between technology and policy?<br \/>\n<img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/farm4.static.flickr.com\/3028\/2297101426_c35d7b30e2.jpg\" alt=\"Photo Credit Visentico \/ Sento on Flickr http:\/\/www.flickr.com\/photos\/visentico\/\"><br \/>\nMoving on I found the following <a href=\"http:\/\/www.fortify.com\/vulncat\/en\/vulncat\/\">classification of coding errors from Fortify Software<\/a> intriguing. ColdFusion, C\/C++, C#\/VB.NET\/ASP.NET, HTML, Java\/JSP, JavaScript, PHP, PLSQL\/TSQL,VisualBasic\/VBScript\/ASP, Webservices, XML are covered, although I think some effort should also be placed on <a href=\"http:\/\/www.tiobe.com\/index.php\/content\/paperinfo\/tpci\/index.html\">Python, Perl, Delphi and Ruby<\/a>.<br \/>\n<img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.tiobe.com\/content\/paperinfo\/tpci\/images\/tpci_trends.png\" alt=\"TIOBE Programming Community Index Chart for March 2009\"><\/p>\n<div style=\"margin-top: 10px; height: 15px;\" class=\"zemanta-pixie\"><a class=\"zemanta-pixie-a\" href=\"http:\/\/reblog.zemanta.com\/zemified\/6f384ea2-1582-4d37-934c-214e090458ac\/\" title=\"Zemified by Zemanta\"><img data-recalc-dims=\"1\" decoding=\"async\" style=\"border: medium none ; float: right;\" class=\"zemanta-pixie-img\" src=\"https:\/\/i0.wp.com\/img.zemanta.com\/reblog_e.png\" alt=\"Reblog this post [with Zemanta]\"><\/a><span class=\"zem-script more-related\"><script type=\"text\/javascript\" src=\"http:\/\/static.zemanta.com\/readside\/loader.js\" defer=\"defer\"><\/script><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>2 reports to mention in this quick post, firstly this ISOC report [pdf] which looks (briefly) at the trust and identity issues that are to tackled on\/for\/with the Internet. The key point I took from it is that we should &#8220;incorporate trust as a core element of the Internet design and deployment process&#8221; and in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[54],"tags":[],"class_list":["post-296","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7O9Cj-4M","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/miguelpdl.com\/weblog\/wp-json\/wp\/v2\/posts\/296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/miguelpdl.com\/weblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/miguelpdl.com\/weblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/miguelpdl.com\/weblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/miguelpdl.com\/weblog\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":0,"href":"https:\/\/miguelpdl.com\/weblog\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"wp:attachment":[{"href":"https:\/\/miguelpdl.com\/weblog\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/miguelpdl.com\/weblog\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/miguelpdl.com\/weblog\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}