Multilateral Security 9.1 Introduction
نویسندگان
چکیده
Often our goal is not to prevent information flowing ‘down’ a hierarchy but to prevent it flowing ‘across’ between departments. Relevant applications range from healthcare to national intelligence, and include most applications where the privacy of individual customers’, citizens’ or patients’ data is at stake. They account for a significant proportion of information processing systems but their protection is often poorly designed and implemented. This has led to a number of expensive fiascos. The basic problem is that if you centralise systems containing sensitive information, you risk creating a more valuable asset and simultaneously giving more people access to it. This is now a pressing problem in the world of ‘Web 2.0’ as online applications amass petabytes of people’s private information. And it’s not just Google Documents; a number of organisations plan to warehouse your medical records online. Microsoft has announced HealthVault, which will let your doctors store your medical records online in a data centre and give you some control over access; other IT firms have broadly similar plans. Yet privacy activists point out that however convenient this
منابع مشابه
Identity management and its support of multilateral security
We show our approach in developing an identity management system with respect to multilateral security. After examining digital pseudonyms and credentials as basic concepts of such a system, we give an introduction to technologies for multilateral security and describe an architecture which enables multilaterally secure communication. By means of dierent scenarios we show requirements of an id...
متن کاملEnhancing Multilateral Security in and by Reputation Systems
With the increasing possibilities for interaction between Internet users exceeding pure communication, in multilateral security the research question arises to rethink and extend classical security requirements. Reputation systems are a possible solution to assist new security requirements. But naturally also reputation systems have to be designed in a multilateral secure way. In this paper we ...
متن کاملNegotiation of Multilateral Security Decisions for Grid Computing
Grid computing enables the sharing of heterogeneous resources within virtual organizations. Since entities in virtual organizations are independently administrated, cross-domain management of access control and intrusion protection is critical for grid services. To provide better protection in grid systems, multiple domains collaborate in making security decisions. Unfortunately, the absence of...
متن کاملMultilateral Security in Mobile Applications and Location Based Services
Due to the many current weaknesses of security mechanisms in mobile technology, location based services essentially depend on security aware middleware and reliable multilateral security concepts. Neither the latest operating systems of mobile devices nor current concepts in wireless communication GPRS, WLAN, or Bluetooth meet the security requirements needed to establish sustainable trust betw...
متن کامل