What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory
نویسنده
چکیده
as the Clinton Administration's Chief Counselor for Privacy, in the Office of Management and Budget. In that position he worked extensively on encryption policy and government computer security issues, including the Federal Intrusion Detection Network (FIDNet), Carnivore, and critical infrastructure issues. In 2000 he chaired a 15-agency White House Working Group on how to update wiretap and electronic surveillance laws for the Internet age. The Administration's legislative proposal was introduced into the Senate in 2000 as S. 3083.
منابع مشابه
MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملتحلیلی بر خطرات معمول زندگی و نقش آن در قلمرو مسئولیت مدنی
Abstract Normal risks are limitations of social life that are different in various situations and are not separable from the essence of life. When these risks make damages to persons, the main question is that weather the approach of tort law towards the compensation of them should be different from other risks or not and what is their role in liability. In this research, after using analyti...
متن کاملAssessing the prioritization of cultural and urban heritages values of Naghshe- Jahan Square
Each country's cultural heritage indicates culture, history, and background of a nation, which has different social, economic, and historical values. However, the evaluation of these heritages does not take place considering the hidden values in them. Therefore, in planning for preservation or exploitation of these heritages some values in them may be ignored. On the other hand, constraint on t...
متن کاملبررسی ابعاد حق بر غذا و امنیت غذایی در اسناد بینالمللی
The right to food and freedom from hunger is a part of fundamental human rights and it shall not be suspended under no circumstances even in the hostilities. Since any infringement of the right to food can lead to death from starvation. Different approaches to solve the problem of malnutrition in times of war and peace, including the right to food and food security have been taken. At the momen...
متن کاملOpen pit limit optimization using dijkstra’s algorithm
In open-pit mine planning, the design of the most profitable ultimate pit limit is a prerequisite to developing a feasible mining sequence. Currently, the design of an ultimate pit is achieved through a computer program in most mining companies. The extraction of minerals in open mining methods needs a lot of capital investment, which may take several decades. Before the extraction, the p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره cs.CR/0109089 شماره
صفحات -
تاریخ انتشار 2001