Revisiting Reachability Management as a Multilateral Security Mechanism
نویسندگان
چکیده
Mobile communications are becoming ever more pervasive in our environment today. However, the decentralised nature of the technology makes achieving security and trust a considerable challenge. On the one hand, people are increasingly dependent on being reachable for communication purposes; on the other hand, they place a high value on security and personal privacy. These conflicting requirements have been discussed in reachability management literature. In essence, reachability management aims to provide users with control over their communications in such a way that their right to personal privacy and security is honoured. At the time when the concept was introduced, certain technical and usability difficulties existed. In this paper the authors, firstly, re-examine the motivation and requirements for reachability management. Secondly, they investigate the opportunities introduced by changes in technology, while also reflecting on changes in the social setting underlying the implementation of reachability management systems.
منابع مشابه
Identity management and its support of multilateral security
We show our approach in developing an identity management system with respect to multilateral security. After examining digital pseudonyms and credentials as basic concepts of such a system, we give an introduction to technologies for multilateral security and describe an architecture which enables multilaterally secure communication. By means of dierent scenarios we show requirements of an id...
متن کاملNegotiation of Multilateral Security Decisions for Grid Computing
Grid computing enables the sharing of heterogeneous resources within virtual organizations. Since entities in virtual organizations are independently administrated, cross-domain management of access control and intrusion protection is critical for grid services. To provide better protection in grid systems, multiple domains collaborate in making security decisions. Unfortunately, the absence of...
متن کاملA Semantic Approach to Reachability Matrix Computation
The Cyber Security is a crucial aspect of networks management. The Reachability Matrix computation is one of the main challenge in this field. This paper presents an intelligent solution in order to address the Reachability Matrix computational problem. Keywords— CyberSecurity;Ontologies; Reasoning.
متن کاملSSM-ping: A ping utility for source specific multicast
Management has become a key concern for the success of multicast deployment in the Internet. One of the most important management tasks for multicast is to verify the availability of the service to its users. This task is referred to as discovering or testing reachability. In this paper, we present a new mechanism, SSM-Ping, for discovering multicast reachability between (remote) end systems in...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005