Reactive Security and Social Control
نویسندگان
چکیده
A major security problem for a network oriented environment is executing untrusted code. Private information risks being disclosed or tampered with if unveri ed remote code manages to gain access to local resources. Since a program only shows to the user what it wants the user to see, it can hide some of its actual actions. This is the essence of a Trojan horse. In the days before global networking the acts of malicious programs mainly perpetrated random acts of vandalism, like erasing les. Now, as computers get increasingly connected, programs can communicate back to their creators. This enables a new range of crimes. As we begin to use open computer networks to transfer information of more direct economic value, we'll nd that programs can to do more malicious things than erasing les. Viruses can be used to snoop passwords to valuable information services or getting hold of e-cash stored on our hard disks. As the trend leads towards where we are down-loading and executing many new programs every day, these problems are only likely to increase. Certifying every program on the Internet would hinder the introduction of new programs, services and even of bugxes. The essence of the open net is that new information is put there almost instantaneously. Hence we can't do away with the concept of an untrusted program. Cryptographic methods like digital signatures can be used to authenticate the sender and/or guarantee that the program hasn't been tampered with. However, the program's hostility cannot be decided by any level of cryptography. For the untrusted software to be useful it may have to be granted access to information that it
منابع مشابه
Using Agents to Secure the Internet Marketplace Reactive Security and Social Control
We present the idea to let agents handle security issues in Internet markets. The motivation for this is the di culties in having external or centralized control over a system as open as the Internet. The agents use social control to warn each other of malicious agents. A security assistant aids the user in deciding the maliciousness of an agent by looking at its behavior, not by trusting the \...
متن کاملThe Reactive Postural Control in Spastic Cerebral Palsy Children
Objectives: Postural control deficit is one of the most important problems in children with spastic cerebral palsy (CP). The purpose of this paper is to review the reactive postural control in spastic children with CP. Methods: Researches on development of reactive postural control in typically developing (TD) children and children with Cerebral Palsy (CP) were analyzed. Results: The resu...
متن کاملThe Role of Security in Social Deviations
The aim of this study is to investigate the role of security in social deviations among women of Babol city. Descriptive survey research method was used and the unit of analysis is 15-29 year old women that 284 women are selected on the basis of Cochran formula and using multi-stage random cluster sampling. The results show that there is a weak significant relationship between the independent v...
متن کاملA New Framework for Reactive Power Market Considering Power System Security
This paper presents a new framework for the day-ahead reactive power market based on the uniform auction price. Voltage stability and security have been considered in the proposed framework. Total Payment Function (TPF) is suggested as the objective function of the Optimal Power Flow (OPF) used to clear the reactive power market. Overload, voltage drop and voltage stability margin (VSM) are inc...
متن کاملDeveloping a Model of Internalof Internal Organizational Factors Effective on Tacit Knowledge Management of Social Security Organization: Grounded Theory Approach
Introduction: The need to design and establish an integrated knowledge management system is one of the strategic issues of the social security organization. The present research was conducted with the aim of developing a model of Internal organizational factors effective on tacit knowledge management of social security organization with the Grounded Theory approach. Method: The current study i...
متن کاملPlanning and Operation of the Active and Reactive sources Constrained to Voltage Security in the Reconfigurable Smart Distribution Network
One of the most important objectives of smart distribution networks (SDNs) is to achieve a secure and reliable network. This can be realized by optimal operation in the presence of active power sources such as the distributed generations (DGs), reactive power sources such as switched capacitor bank (SCB), active loads such as the demand response program (DRP), and various network management str...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996