A Vision for Scalable Trustworthy Computing
نویسندگان
چکیده
The cybersecurity landscape consists of an ad hoc patchwork of solutions [1]. Optimal cybersecurity is considered “hard,” for various reasons: complexity, immense data and processing requirements, resourceagnostic cloud computing, practical time-space-energy constraints, inherent flaws in “Maginot Line” defenses as well as the growing number and sophistication of attacks. We begin by defining and abstracting the high priority problems including a crosswalk of the potential and co-opted solution space. Within that space, we claim that achieving scalable trustworthy computing and communications is possible via real-time knowledge-based decisions about cyber trust. Our vision is based on the humanphysiologyimmunity (HPI) metaphor and the human brain‟s ability to extract knowledge from data and information. We outline some future steps toward scalable trustworthy systems requiring a long-term commitment to solve the wellknown “hard problems.”
منابع مشابه
Data Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملScalable reputation management with trustworthy user selection for P2P MMOGs
Networked virtual environments (NVEs) such as Massively Multiplayer Online Games (MMOGs) have become very popular in recent years. However, existing client-server architectures suffer from resource constrains when the number of concurrent users increases. Research on peer-to-peer networked virtual environments (P2P NVEs) thus tries to find more scalable and affordable methods via the resource s...
متن کاملEvaluating How the Islamic Republic of Iran Achieved its Vision Economic Goals by Designing and Computing a Composite Index and Using Monte Carlo Simulation Approach for Uncertainty Analysis
The Islamic Republic of Iran Vision aimed to direct development plans and yearly budgets. As one of the most important part, it includes 13 economic goals for directing economic route of the country for a twenty years period. After 15 years, evaluating how the country achieved to these goals is very important and unfortunately neglected. In this article, considering the different nature of goal...
متن کاملSCALABLE, TRUSTWORTHY NETWORK COMPUTING USING UNTRUSTED INTERMEDIARIES A Position Paper
The extraordinary success of the Internet as a general-purpose, widely sharable, and globally scalable data communication network has set a very high standard for the designers of next generation cyberinfrastructure. Comparable success would be difficult to achieve under any circumstances, but today all visions of major new systems must face intensified requirements for trustworthiness that mak...
متن کاملTowards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source
Cloud computing enables IT related services in a more dynamic and scalable way than before – more costeffective than before due to the economy of scale and of sharing resources. Usually, cloud providers describe their promised behaviour – regarding functional and non-functional aspects of the service provision – by way of Service Level Agreements (SLAs). For different providers offering similar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010