Survivability & Trust
نویسندگان
چکیده
In the Next Generation Internet security will be a cumulative, distributed, and probabilistic. The approach to security as survivability reflects the need of a Next Generation Internet where robustness must compensate for lack of hardening; and denial of service or disconnection are not acceptable defense mechanisms. In sum, the Next Generation Internet has to have survivability as a whole, as well as secure at the end points.
منابع مشابه
On Tradeoffs between Trust and Survivability Using a Game Theoretic Approach
Military communities in tactical networks must often maintain high group solidarity based on the trustworthiness of participating individual entities where collaboration is critical to performing team-oriented missions. Group trust is regarded as more important than trust of an individual entity since consensus among or compliance of participating entities with given protocols may significantly...
متن کاملSurvivability and Simulation
The past few years have shown a need for fundamentally new approaches to the security and survivability of large scale networked systems. Infrastructures and other modern systems pose problems that arise from many factors: partial information, complexity of combined interactions of very large numbers of human and automated participants, ubiquitous access, loss of centralized administrative cont...
متن کاملModeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs
Mobile ad hoc and sensor networks often contain a mixture of nodes, some of which may be selfish and non-cooperative in providing network services such as forwarding packets in order to conserve energy. Existing trust management protocols for mobile ad hoc networks (MANETs) advocate isolating selfish nodes as soon as they are detected. Further, altruistic behaviors are encouraged with incentive...
متن کاملSurvivable Multi-Level Ad-Hoc Group Operations
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishing security policies. We identify various issues in group formation and evolution. We define components and rules of direct trust and trust recommendation. We then apply them in constructing functioning groups. We also ...
متن کاملGranular Trust Model Improves Enterprise Security
Our new approach to information security provides more flexible, dynamic, and granular security controls than traditional enterprise security models. We have based the new approach to security on trust calculation, security zones, balanced security controls, and an expanded concept of perimeters that includes users and data. We are also focusing on survivability, based on the assumption that in...
متن کامل