|
|
privacy |
||
|
Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.
Blog Feed Recent Items The nfoCentrale Blog Conclave nfoCentrale Associated Sites |
2005-04-09Secure Overlays on Insecure Internets: It Could Happen?ACM News Service: Lessons in Cybersafety. In this blurb, it is pointed out that the design of the Internet assumes reasonable behavior on the part of its nodes and circuits. So malicious traffic is intermingled with, and appears the same as, friendly traffic. From this observation, one may argue that security breaches are inevitable because there need be no technical different between harmful and friendly traffic at the Internet level. The proposal covered in the Robert Parkins 2005-04-05 ITWorldCanada article involves coming up with a new network where the participants are determined to be mutually reliable. Internet II is viewed as one case, as is the prospect for overlay networks on the current Internet. There is extensive coverage of the erosion of privacy that is occurring by application of the Internet, as well as the general bad neighborhood aspect. What do you do when the muggers are the neighborhood police? I am, nevertheless, focused here on the prospect of secure overlays that work for connected communities, a problem that Peer-to-Peer (P2P) and Grid technology must also deal with. Michael Smith, CTO of Secured Services Inc., offers up an "identity lifecycle management system" and I assume these stages are designed to fit with an authentication system: creation, use, maintenance, deletion and audit of identity. That sounds like something to learn more about, along with other flurries of activity around digital identity.
|
||
|
|
You are navigating Orcmid's Lair. |
template
created 2004-06-17-20:01 -0700 (pdt)
by orcmid |