Security Through Publicity
نویسندگان
چکیده
Current large-scale authentication and non-repudiation systems offer various security measures, but do not meet the needs of today’s Internet-scale applications. Though several designs exist, there have been no significant deployments of Internet-scale security infrastructures. In this paper we propose a novel concept called the public-space that makes complete information of digital entities’ actions publicly available to every user. It is a structured framework that maintains a large number of entities, their actions, relationships, and histories. Posting such information in public does not endorse the information’s correctness, but it does provide users with a quantifiable set of information that enables them to detect faults and make informed security decisions. Combined with traditional cryptographic techniques, the public-space system can support the intrinsic heterogeneity of user security requirements in Internetscale infrastructures and applications.
منابع مشابه
IBM Security zSecure Audit
●● ● ●Leverage tailored reporting to generate baseline verifications of security Security is a cornerstone of any organization’s control environment, and in today’s networked economy, it is essential to have effective protection against IT threats. Security breaches can result in financial losses, unauthorized access to confidential information, theft of intellectual property, service disruptio...
متن کاملVulnerability Disclosure: The Strange Case of Bret McDanel
Responsible developers work hard to produce secure, reliable, and efficient software packages. No company wants its integrity compromised by hackers, employees, or legitimate users. Negative publicity damages a firm’s reputation. Legal proceedings can cost an organization millions and destroy any chance of long-term success. Realistically, few products are released without security flaws. Progr...
متن کاملResearch on the Data and Transaction Security of Enterprise E- Commerce Countermeasure
In the process of transmitting Business E-commerce information, there are various risks that can put it at stake at any time. So in this article, for the purpose of ensuring the security of the devices, operating systems and data transaction, elaborate the security of Business Ecommerce from the aspect of VLAN, application layer, session layer, dynamic password, symmetric key encryption and enc...
متن کاملIs Any Publicity Good Publicity? A Note on the Impact of Book Reviews
This paper uses detailed weekly data on sales of hardcover fiction books to evaluate the impact of New York Times book reviews on sales. In order to weigh the relative propensity of reviews to inform and to persuade, the analysis utilizes a measure of review opinion obtained through a systematic reading of each review. The estimates indicate that in the case of book reviews, any publicity is go...
متن کاملAir Force Intrusion Detection System Evaluation Environment
Ongoing DARPA-sponsored research in computer intrusion detection (ID) has produced emerging systems that exploit a variety of techniques such as network sniffing, filesystem checks and local host audit record inspection, or more complex correlations of distributed sensors’ various reports. This research has become increasingly important as computer attacks increase in number, publicity and dama...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006