首页 > 最新文献

Proceedings. IEEE Symposium on Security and Privacy最新文献

英文 中文
Distance-Bounding Protocols: Verification without Time and Location 距离绑定协议:不需要时间和地点的验证
Pub Date : 2018-01-01 DOI: 10.1109/SP.2018.00001
S. Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on the physical distance between the participants. Existing symbolic verification frameworks for distance-bounding protocols consider timestamps and the location of agents. In this work we introduce a causality-based characterization of secure distance-bounding that discards the notions of time and location. This allows us to verify the correctness of distance-bounding protocols with standard protocol verification tools. That is to say, we provide the first fully automated verification framework for distance-bounding protocols. By using our framework, we confirmed known vulnerabilities in a number of protocols and discovered unreported attacks against two recently published protocols.
距离边界协议是安全建立参与者之间物理距离上界的加密协议。现有的距离边界协议的符号验证框架考虑了时间戳和代理的位置。在这项工作中,我们引入了一种基于因果关系的安全距离边界表征,它抛弃了时间和位置的概念。这允许我们用标准协议验证工具验证距离边界协议的正确性。也就是说,我们为距离边界协议提供了第一个完全自动化的验证框架。通过使用我们的框架,我们确认了许多协议中的已知漏洞,并发现了针对两个最近发布的协议的未报告攻击。
{"title":"Distance-Bounding Protocols: Verification without Time and Location","authors":"S. Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua","doi":"10.1109/SP.2018.00001","DOIUrl":"https://doi.org/10.1109/SP.2018.00001","url":null,"abstract":"Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on the physical distance between the participants. Existing symbolic verification frameworks for distance-bounding protocols consider timestamps and the location of agents. In this work we introduce a causality-based characterization of secure distance-bounding that discards the notions of time and location. This allows us to verify the correctness of distance-bounding protocols with standard protocol verification tools. That is to say, we provide the first fully automated verification framework for distance-bounding protocols. By using our framework, we confirmed known vulnerabilities in a number of protocols and discovered unreported attacks against two recently published protocols.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"10 1","pages":"549-566"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79544652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Anon-Pass: Practical Anonymous Subscriptions. Anon-Pass:实用匿名订阅。
Pub Date : 2013-12-31 DOI: 10.1109/SP.2013.29
Michael Z Lee, Alan M Dunn, Jonathan Katz, Brent Waters, Emmett Witchel

We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

我们介绍了一个匿名订阅服务的设计、安全证明和实现。用户通过提供某种形式的身份来注册服务,这些身份可能与真实世界的身份(如信用卡、web登录或公钥)相关联,也可能不关联。用户通过出示从注册时收到的信息派生的凭据登录系统。每个凭据只允许在任何身份验证窗口或epoch中进行一次登录。登录是匿名的,因为服务无法区分哪个用户正在登录,比随机猜测要好得多。这意味着用户跨不同登录的不可链接性。我们发现,匿名订阅服务的核心矛盾在于服务提供商希望获得较长的epoch(以减少服务器端计算),而用户希望获得较短的epoch(以便他们可以反复“重新匿名化”他们的会话)。我们通过缩短时间来平衡这种紧张关系,但为不需要不可链接性的客户增加了一个有效的操作,以便为下一个时间段廉价地重新验证自己。我们测量了协议的研究原型的性能,该原型允许一个独立的服务提供对现有服务的匿名访问。我们实现了一个音乐服务、一个基于android的地铁通行证应用程序和一个web代理,并表明添加匿名功能可以最小化客户端延迟,并且每个活跃用户只需要33 KB的服务器内存。
{"title":"Anon-Pass: Practical Anonymous Subscriptions.","authors":"Michael Z Lee,&nbsp;Alan M Dunn,&nbsp;Jonathan Katz,&nbsp;Brent Waters,&nbsp;Emmett Witchel","doi":"10.1109/SP.2013.29","DOIUrl":"https://doi.org/10.1109/SP.2013.29","url":null,"abstract":"<p><p>We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or <i>epoch</i>. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly \"re-anonymize\" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.</p>","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"2013 ","pages":"319-333"},"PeriodicalIF":0.0,"publicationDate":"2013-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/SP.2013.29","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32096088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy IEEE安全与隐私研讨会30周年回顾
Pub Date : 2010-05-16 DOI: 10.1109/SP.2010.43
P. Neumann, M. Bishop, S. Peisert, M. Schaefer
This article is a retrospective of concepts and people who have contributed significantly to the IEEE Symposium on Security and Privacy over the past 30 years. The authors identify many individuals who have contributed to SSP as program chairs, general chairs, and heads of the overseeing IEEE technical committee. They recognize SSP participants who have provided significant leadership in creating and funding opportunities for research and development in security and privacy. Some contributions to advances in security are also discussed in following articles by Carl Landwehr and Douglas Maughan, both of whom have been major instigators of R&D programs at multiple US government agencies. The authors also highlight some influential SSP papers from three decades, and also efforts that have had significant impact in providing or stimulating effective technology transfer, as well as authors and educators whose work provided major contributions to academic curricula, all helping instill trustworthiness into computercommunication security. Finally, they identify some of the anniversary event honorees.
本文回顾了过去30年来对IEEE安全和隐私研讨会做出重大贡献的概念和人物。作者确定了许多为SSP做出贡献的个人,如项目主席、总主席和监督IEEE技术委员会的负责人。他们认可在创造和资助安全和隐私研究与发展机会方面发挥重要领导作用的SSP参与者。Carl Landwehr和Douglas Maughan在接下来的文章中也讨论了对安全进步的一些贡献,他们都是多个美国政府机构研发项目的主要发起者。作者还强调了三十年来一些有影响力的SSP论文,以及在提供或刺激有效技术转让方面产生重大影响的努力,以及为学术课程做出重大贡献的作者和教育工作者,所有这些都有助于向计算机通信安全灌输可信赖性。最后,他们确定了一些周年纪念活动的获奖者。
{"title":"Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy","authors":"P. Neumann, M. Bishop, S. Peisert, M. Schaefer","doi":"10.1109/SP.2010.43","DOIUrl":"https://doi.org/10.1109/SP.2010.43","url":null,"abstract":"This article is a retrospective of concepts and people who have contributed significantly to the IEEE Symposium on Security and Privacy over the past 30 years. The authors identify many individuals who have contributed to SSP as program chairs, general chairs, and heads of the overseeing IEEE technical committee. They recognize SSP participants who have provided significant leadership in creating and funding opportunities for research and development in security and privacy. Some contributions to advances in security are also discussed in following articles by Carl Landwehr and Douglas Maughan, both of whom have been major instigators of R&D programs at multiple US government agencies. The authors also highlight some influential SSP papers from three decades, and also efforts that have had significant impact in providing or stimulating effective technology transfer, as well as authors and educators whose work provided major contributions to academic curricula, all helping instill trustworthiness into computercommunication security. Finally, they identify some of the anniversary event honorees.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"2 1","pages":"3-13"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76006603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SecureWorld Expo 2005
Pub Date : 2005-11-01 DOI: 10.1109/MSP.2005.156
Faith M. Keikkila
A report on SecureWorld Expo 2005, held 21 to 22 September 2005 in Dearborn, Michigan. The SecureWorld Expo targets business and IT professionals with security concerns and provides them with an industry-wide agenda to help solve those concerns through a partnership with government agencies.
2005年9月21日至22日在密歇根州迪尔伯恩举行的2005年世界安全博览会报告。SecureWorld博览会的目标是关注安全问题的业务和IT专业人员,并为他们提供一个行业范围的议程,通过与政府机构的合作来帮助解决这些问题。
{"title":"SecureWorld Expo 2005","authors":"Faith M. Keikkila","doi":"10.1109/MSP.2005.156","DOIUrl":"https://doi.org/10.1109/MSP.2005.156","url":null,"abstract":"A report on SecureWorld Expo 2005, held 21 to 22 September 2005 in Dearborn, Michigan. The SecureWorld Expo targets business and IT professionals with security concerns and provides them with an industry-wide agenda to help solve those concerns through a partnership with government agencies.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"54 1","pages":"57-60"},"PeriodicalIF":0.0,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84592582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Programming languages and systems security 编程语言和系统安全
Pub Date : 2005-05-01 DOI: 10.1109/MSP.2005.77
C. Salka
Modern research and development has produced various language-level supports for secure systems design. Safe languages provide a flexible and reliable foundation on which to build. Language-based security abstractions provide systems programmers with an effective means of defining and enforcing security models. Controlled language-execution models can impose fine-grained and powerful restrictions on code at varying levels of trust. Arguably, the most popular modern general-purpose languages, Java and C#, bear witness to the importance of programming language safety and security, being both safe and endowed with sophisticated security models. Research into these topics is ongoing, but perhaps the most important current task is the integration of modern language security technologies (much more efficient and effective than past technologies) with realistic systems design.
现代研究和发展已经为安全系统设计提供了各种语言级别的支持。安全语言为构建提供了灵活可靠的基础。基于语言的安全抽象为系统程序员提供了一种定义和实施安全模型的有效方法。受控语言执行模型可以对不同信任级别的代码施加细粒度和强大的限制。可以说,最流行的现代通用语言Java和c#证明了编程语言安全和安全性的重要性,它们既安全又具有复杂的安全模型。对这些主题的研究正在进行中,但当前最重要的任务可能是将现代语言安全技术(比过去的技术更高效)与实际的系统设计集成在一起。
{"title":"Programming languages and systems security","authors":"C. Salka","doi":"10.1109/MSP.2005.77","DOIUrl":"https://doi.org/10.1109/MSP.2005.77","url":null,"abstract":"Modern research and development has produced various language-level supports for secure systems design. Safe languages provide a flexible and reliable foundation on which to build. Language-based security abstractions provide systems programmers with an effective means of defining and enforcing security models. Controlled language-execution models can impose fine-grained and powerful restrictions on code at varying levels of trust. Arguably, the most popular modern general-purpose languages, Java and C#, bear witness to the importance of programming language safety and security, being both safe and endowed with sophisticated security models. Research into these topics is ongoing, but perhaps the most important current task is the integration of modern language security technologies (much more efficient and effective than past technologies) with realistic systems design.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"39 1","pages":"80-83"},"PeriodicalIF":0.0,"publicationDate":"2005-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86158780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
How to win an evolutionary arms race 如何赢得进化军备竞赛
Pub Date : 2004-11-01 DOI: 10.1109/MSP.2004.100
Anil Somayaji
To keep up with malware writers, software producers in both the commercial and open-source software worlds have adopted various automatic software update mechanisms. Some of these mechanisms distribute updates after requesting a user's permission; others install updates automatically. Although such systems provide some short-term relief, they will likely soon become ineffective, and further, they will also become extremely dangerous once they are inevitably co-opted by attackers. If we want the Internet to remain a viable way to communicate and collaborate, we must adopt another, perhaps radically different, model for securing our computers. To better understand this conclusion, we should first re-examine why developers and users are embracing automated update systems.
为了跟上恶意软件编写者的步伐,商业软件和开源软件领域的软件生产商都采用了各种自动软件更新机制。其中一些机制在请求用户许可后分发更新;其他的会自动安装更新。尽管这些系统提供了一些短期的缓解,但它们可能很快就会变得无效,而且,一旦它们不可避免地被攻击者所利用,它们也会变得极其危险。如果我们希望互联网仍然是一种可行的交流和协作方式,我们必须采用另一种可能完全不同的模式来保护我们的计算机。为了更好地理解这一结论,我们应该首先重新审视为什么开发者和用户会接受自动更新系统。
{"title":"How to win an evolutionary arms race","authors":"Anil Somayaji","doi":"10.1109/MSP.2004.100","DOIUrl":"https://doi.org/10.1109/MSP.2004.100","url":null,"abstract":"To keep up with malware writers, software producers in both the commercial and open-source software worlds have adopted various automatic software update mechanisms. Some of these mechanisms distribute updates after requesting a user's permission; others install updates automatically. Although such systems provide some short-term relief, they will likely soon become ineffective, and further, they will also become extremely dangerous once they are inevitably co-opted by attackers. If we want the Internet to remain a viable way to communicate and collaborate, we must adopt another, perhaps radically different, model for securing our computers. To better understand this conclusion, we should first re-examine why developers and users are embracing automated update systems.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"5 1","pages":"70-72"},"PeriodicalIF":0.0,"publicationDate":"2004-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83539449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The rise of the gadgets 小工具的兴起
Pub Date : 2003-09-01 DOI: 10.1109/MSECP.2003.1236241
I. Acre
The emergence of networkable gadgets, ranging from printers and DSL routers to gaming consoles, cameras, and personal data assistants (PDA), can pose serious risks to an otherwise secure infrastructure. In this installment of Attack Trends, the author examines sample vulnerabilities and research that might point to novel attack vectors that administrators should consider when planning a well thought-out information security strategy.
从打印机和DSL路由器到游戏机、相机和个人数据助理(PDA)等可联网设备的出现,可能给原本安全的基础设施带来严重风险。在攻击趋势的这一部分中,作者研究了一些漏洞示例和研究,这些漏洞和研究可能指向管理员在规划经过深思熟虑的信息安全策略时应该考虑的新的攻击向量。
{"title":"The rise of the gadgets","authors":"I. Acre","doi":"10.1109/MSECP.2003.1236241","DOIUrl":"https://doi.org/10.1109/MSECP.2003.1236241","url":null,"abstract":"The emergence of networkable gadgets, ranging from printers and DSL routers to gaming consoles, cameras, and personal data assistants (PDA), can pose serious risks to an otherwise secure infrastructure. In this installment of Attack Trends, the author examines sample vulnerabilities and research that might point to novel attack vectors that administrators should consider when planning a well thought-out information security strategy.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"102 1","pages":"78-81"},"PeriodicalIF":0.0,"publicationDate":"2003-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90350363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Ethics and teaching information assurance 伦理与教学信息保障
Pub Date : 2003-07-01 DOI: 10.1109/MSECP.2003.1219073
B. Endicoytt-Popuvsky
Has the US become an ethically challenged nation? If so, what does that mean for information assurance (IA) educators? The annual Computer Security Institute (CSI)-Federal Bureau of Investigations (FBI) Computer Crime Survey, typically a barometer of computer crime in the US, presents alarming statistics about rising digital crime rates over our public networks. The survey, which gathered voluntary responses firm US corporations and government agencies, reports that computer crime incidents are reaching epidemic proportions. The erosion of teaching and practicing ethics, coupled with the widespread belief that the Internet provides unbreakable anonymity for users, is a recipe for disaster. The paper discusses ethics in an IA curriculum and IA educational recommendations.
美国已经成为一个道德沦丧的国家了吗?如果是这样,这对信息保障(IA)教育者意味着什么?一年一度的计算机安全研究所(CSI)-联邦调查局(FBI)计算机犯罪调查,通常是美国计算机犯罪的晴雨表,提供了令人震惊的统计数据,表明我们公共网络上的数字犯罪率正在上升。该调查收集了美国企业和政府机构的自愿回复,报告称,计算机犯罪事件正达到流行病的程度。教学和实践道德的侵蚀,再加上人们普遍认为互联网为用户提供了牢不可破的匿名性,这些都是灾难的根源。本文讨论了内部审计课程中的伦理问题以及内部审计的教育建议。
{"title":"Ethics and teaching information assurance","authors":"B. Endicoytt-Popuvsky","doi":"10.1109/MSECP.2003.1219073","DOIUrl":"https://doi.org/10.1109/MSECP.2003.1219073","url":null,"abstract":"Has the US become an ethically challenged nation? If so, what does that mean for information assurance (IA) educators? The annual Computer Security Institute (CSI)-Federal Bureau of Investigations (FBI) Computer Crime Survey, typically a barometer of computer crime in the US, presents alarming statistics about rising digital crime rates over our public networks. The survey, which gathered voluntary responses firm US corporations and government agencies, reports that computer crime incidents are reaching epidemic proportions. The erosion of teaching and practicing ethics, coupled with the widespread belief that the Internet provides unbreakable anonymity for users, is a recipe for disaster. The paper discusses ethics in an IA curriculum and IA educational recommendations.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"47 1","pages":"65-67"},"PeriodicalIF":0.0,"publicationDate":"2003-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84867867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Robust Nonproprietary Software 健壮的非专有软件
Pub Date : 2000-05-14 DOI: 10.1109/SP.2000.10003
Peter G. Neumann
Our ultimate goal here is to be able to develop robust systems and applications that are capable of satisfying serious requirements, not merely for security but also for reliability, fault tolerance, human safety, and survivability in the face of a wide range of realistic adversities - including hardware malfunctions, software glitches, inadvertent human actions, massive coordinated attacks, and acts of God. Also relevant are additional operational requirements such as interoperability, evolvability and maintainability, as well as discipline in the software development process.
我们在这里的最终目标是能够开发健壮的系统和应用程序,这些系统和应用程序不仅能够满足安全性的严格要求,而且能够满足可靠性、容错性、人类安全性和面对各种现实逆境(包括硬件故障、软件故障、无意的人类行为、大规模协调攻击和上帝的行为)的生存能力。同样相关的还有额外的操作需求,比如互操作性、可发展性和可维护性,以及软件开发过程中的规程。
{"title":"Robust Nonproprietary Software","authors":"Peter G. Neumann","doi":"10.1109/SP.2000.10003","DOIUrl":"https://doi.org/10.1109/SP.2000.10003","url":null,"abstract":"Our ultimate goal here is to be able to develop robust systems and applications that are capable of satisfying serious requirements, not merely for security but also for reliability, fault tolerance, human safety, and survivability in the face of a wide range of realistic adversities - including hardware malfunctions, software glitches, inadvertent human actions, massive coordinated attacks, and acts of God. Also relevant are additional operational requirements such as interoperability, evolvability and maintainability, as well as discipline in the software development process.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"34 1","pages":"122-123"},"PeriodicalIF":0.0,"publicationDate":"2000-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83821744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Is Electronic Privacy Achievable? 电子隐私是否可行?
Pub Date : 2000-04-30 DOI: 10.1109/SP.2000.10001
C. Irvine, T. Levin
“You have zero privacy anyway. Get over it.” Scott McNealy, Sun MicrosystemsWhile secrecy and integrity policies are most often crafted for protection of corporate (e.g., commercial, educational and government) information, we understand privacy policies to be targeted toward the protection of information for and about individuals. The purpose of this panel is to focus on how new technologies are affecting privacy.
“反正你没有隐私。克服它吧。”Scott McNealy, Sun微系统公司虽然保密和完整性政策通常是为了保护公司(如商业、教育和政府)的信息而制定的,但我们认为隐私政策的目标是保护个人的信息。这个小组的目的是关注新技术是如何影响隐私的。
{"title":"Is Electronic Privacy Achievable?","authors":"C. Irvine, T. Levin","doi":"10.1109/SP.2000.10001","DOIUrl":"https://doi.org/10.1109/SP.2000.10001","url":null,"abstract":"“You have zero privacy anyway. Get over it.” Scott McNealy, Sun MicrosystemsWhile secrecy and integrity policies are most often crafted for protection of corporate (e.g., commercial, educational and government) information, we understand privacy policies to be targeted toward the protection of information for and about individuals. The purpose of this panel is to focus on how new technologies are affecting privacy.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"62 1","pages":"76-77"},"PeriodicalIF":0.0,"publicationDate":"2000-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77920697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings. IEEE Symposium on Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1