Multilateral Security 9.1 Introduction

نویسندگان

  • Roger Needham
  • Scott Mcnealy
چکیده

Often our goal is not to prevent information flowing ‘down’ a hierarchy but to prevent it flowing ‘across’ between departments. Relevant applications range from healthcare to national intelligence, and include most applications where the privacy of individual customers’, citizens’ or patients’ data is at stake. They account for a significant proportion of information processing systems but their protection is often poorly designed and implemented. This has led to a number of expensive fiascos. The basic problem is that if you centralise systems containing sensitive information, you risk creating a more valuable asset and simultaneously giving more people access to it. This is now a pressing problem in the world of ‘Web 2.0’ as online applications amass petabytes of people’s private information. And it’s not just Google Documents; a number of organisations plan to warehouse your medical records online. Microsoft has announced HealthVault, which will let your doctors store your medical records online in a data centre and give you some control over access; other IT firms have broadly similar plans. Yet privacy activists point out that however convenient this

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity management and its support of multilateral security

We show our approach in developing an identity management system with respect to multilateral security. After examining digital pseudonyms and credentials as basic concepts of such a system, we give an introduction to technologies for multilateral security and describe an architecture which enables multilaterally secure communication. By means of di€erent scenarios we show requirements of an id...

متن کامل

Enhancing Multilateral Security in and by Reputation Systems

With the increasing possibilities for interaction between Internet users exceeding pure communication, in multilateral security the research question arises to rethink and extend classical security requirements. Reputation systems are a possible solution to assist new security requirements. But naturally also reputation systems have to be designed in a multilateral secure way. In this paper we ...

متن کامل

Negotiation of Multilateral Security Decisions for Grid Computing

Grid computing enables the sharing of heterogeneous resources within virtual organizations. Since entities in virtual organizations are independently administrated, cross-domain management of access control and intrusion protection is critical for grid services. To provide better protection in grid systems, multiple domains collaborate in making security decisions. Unfortunately, the absence of...

متن کامل

Multilateral Security in Mobile Applications and Location Based Services

Due to the many current weaknesses of security mechanisms in mobile technology, location based services essentially depend on security aware middleware and reliable multilateral security concepts. Neither the latest operating systems of mobile devices nor current concepts in wireless communication GPRS, WLAN, or Bluetooth meet the security requirements needed to establish sustainable trust betw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008