Security Through Publicity

نویسندگان

  • Eric Osterweil
  • Daniel Massey
  • Batsukh Tsendjav
  • Beichuan Zhang
  • Lixia Zhang
چکیده

Current large-scale authentication and non-repudiation systems offer various security measures, but do not meet the needs of today’s Internet-scale applications. Though several designs exist, there have been no significant deployments of Internet-scale security infrastructures. In this paper we propose a novel concept called the public-space that makes complete information of digital entities’ actions publicly available to every user. It is a structured framework that maintains a large number of entities, their actions, relationships, and histories. Posting such information in public does not endorse the information’s correctness, but it does provide users with a quantifiable set of information that enables them to detect faults and make informed security decisions. Combined with traditional cryptographic techniques, the public-space system can support the intrinsic heterogeneity of user security requirements in Internetscale infrastructures and applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IBM Security zSecure Audit

●● ● ●Leverage tailored reporting to generate baseline verifications of security Security is a cornerstone of any organization’s control environment, and in today’s networked economy, it is essential to have effective protection against IT threats. Security breaches can result in financial losses, unauthorized access to confidential information, theft of intellectual property, service disruptio...

متن کامل

Vulnerability Disclosure: The Strange Case of Bret McDanel

Responsible developers work hard to produce secure, reliable, and efficient software packages. No company wants its integrity compromised by hackers, employees, or legitimate users. Negative publicity damages a firm’s reputation. Legal proceedings can cost an organization millions and destroy any chance of long-term success. Realistically, few products are released without security flaws. Progr...

متن کامل

Research on the Data and Transaction Security of Enterprise E- Commerce Countermeasure

In the process of transmitting Business E-commerce information, there are various risks that can put it at stake at any time. So in this article, for the purpose of ensuring the security of the devices, operating systems and data transaction, elaborate the security of Business Ecommerce from the aspect of VLAN, application layer, session layer, dynamic password, symmetric key encryption and enc...

متن کامل

Is Any Publicity Good Publicity? A Note on the Impact of Book Reviews

This paper uses detailed weekly data on sales of hardcover fiction books to evaluate the impact of New York Times book reviews on sales. In order to weigh the relative propensity of reviews to inform and to persuade, the analysis utilizes a measure of review opinion obtained through a systematic reading of each review. The estimates indicate that in the case of book reviews, any publicity is go...

متن کامل

Air Force Intrusion Detection System Evaluation Environment

Ongoing DARPA-sponsored research in computer intrusion detection (ID) has produced emerging systems that exploit a variety of techniques such as network sniffing, filesystem checks and local host audit record inspection, or more complex correlations of distributed sensors’ various reports. This research has become increasingly important as computer attacks increase in number, publicity and dama...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006