{"title":"The Trusted Function in Secure Decenralized Processing","authors":"P. T. Withington","doi":"10.1109/SP.1980.10013","DOIUrl":null,"url":null,"abstract":"The information processors in a decentralized computing system must trust each other enough to be mutually supportive, yet they must also protect themselves to maintain autonomy. In a decentralized system, data security is especially important because the effects of compromise or sabotage can be so wide-ranging. The trusted function is an ad hoc solution to a problem with present data security models. This \"consistency\" problem, never previously addressed in a formal manner, is aggravated in the decentralized processing setting. The paper examines the consistency problem and proposes an addition to existing security models to address the problem. Using the model, the impact of the trusted function on secure, decentralized-processing system design is assessed.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"105 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1980 IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SP.1980.10013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The information processors in a decentralized computing system must trust each other enough to be mutually supportive, yet they must also protect themselves to maintain autonomy. In a decentralized system, data security is especially important because the effects of compromise or sabotage can be so wide-ranging. The trusted function is an ad hoc solution to a problem with present data security models. This "consistency" problem, never previously addressed in a formal manner, is aggravated in the decentralized processing setting. The paper examines the consistency problem and proposes an addition to existing security models to address the problem. Using the model, the impact of the trusted function on secure, decentralized-processing system design is assessed.