Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
All Your BIOS Are Still Mine
 
CyLab's Angle on Sustainable Computing and Trustwo...
 
C# Moves Head in Statistical Leapfrog
 
Open Authentication: One-Time Passwords and Crypto...
 
Is Faith in Innovation Wearing Thin?
 
Repairing Aberrant Behavior: But Is That the Threa...
 
Standards as Arbitrary Solutions to Recurring Prob...
 
Easy trouble-free use of IT tops the list
 
Maturing UML and Increasing Expressiveness
 
More Open Than Open

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2005-04-09

 

Secure Overlays on Insecure Internets: It Could Happen?

ACM News Service: Lessons in Cybersafety.  In this blurb, it is pointed out that the design of the Internet assumes reasonable behavior on the part of its nodes and circuits.  So malicious traffic is intermingled with, and appears the same as, friendly traffic.  From this observation, one may argue that security breaches are inevitable because there need be no technical different between harmful and friendly traffic at the Internet level. The proposal covered in the Robert Parkins 2005-04-05 ITWorldCanada article involves coming up with a new network where the participants are determined to be mutually reliable.  Internet II is viewed as one case, as is the prospect for overlay networks on the current Internet. There is extensive coverage of the erosion of privacy that is occurring by application of the Internet, as well as the general bad neighborhood aspect.  What do you do when the muggers are the neighborhood police? I am, nevertheless, focused here on the prospect of secure overlays that work for connected communities, a problem that Peer-to-Peer (P2P) and Grid technology must also deal with. Michael Smith, CTO of Secured Services Inc., offers up an "identity lifecycle management system" and I assume these stages are designed to fit with an authentication system: creation, use, maintenance, deletion and audit of identity.  That sounds like something to learn more about, along with other flurries of activity around digital identity.

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $