• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity (2005)

by C Kreibich
Venue:In FREENIX
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

Wireless urban sensing systems

by Mani Srivastava, Mark Hansen, Jeff Burke, Andrew Parker, Sasank Reddy , 2006
"... I.A. Emerging personal, social, and urban sensing applications Application context inevitably drives the architecture design choices and the definition of services needed in a network. Over the past decade, the emergence of unanticipated applications of the Internet, such as peer-to-peer file sharin ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
I.A. Emerging personal, social, and urban sensing applications Application context inevitably drives the architecture design choices and the definition of services needed in a network. Over the past decade, the emergence of unanticipated applications of the Internet, such as peer-to-peer file sharing, networked gaming, podcasting, and voice telephony, has contributed to a pressing need to rethink the core Internet infrastructure and its accompanying architectural choices. To truly lay a foundation for tomorrow’s infrastructure, however, requires going beyond simply reacting to applications that have already emerged, to proactively considering the architectural implications of new classes of applications. A key area in this regard involves embedded sensing technology, presently poised to moved beyond scientific, engineering, and industrial domains into broader and more diverse citizen-initiated sensing in personal, social and urban ones. Today, applications are emerging which draw on sensed information about people, objects, and physical spaces. These applications enable new kinds of social exchange: By collecting, processing, sharing, and visualizing this information, they can offer us new and unexpected views of our communities. To achieve their potential, these applications require fundamentally new algorithms and software mechanisms, because physical inputs now become critical. The research

NSF Proposal TWC: Frontier: Collaborative: Beyond Technical Security: Developing an Empirical Basis for Socio-Economic Perspectives

by Stefan Savage, Geoffrey M. Voelker, James Fowler, Alex Snoeren, Lawrence Saul, Kirill Levchenko, Erin Kenneally, Vern Paxson, Mark Allman, Chris Grier, Chris Hoofnagle, Dan Klein, Christian Kreibich, Deirdre Mulligan, Nicholas Weaver, Damon Mccoy , 2012
"... Security is at once a technical property of a system and a socio-economic property of the environment in which it operates. The former property—focused on real or potential abuse resulting from unintended design or implementation vulnerabilities—encompasses the vast majority of security research and ..."
Abstract - Add to MetaCart
Security is at once a technical property of a system and a socio-economic property of the environment in which it operates. The former property—focused on real or potential abuse resulting from unintended design or implementation vulnerabilities—encompasses the vast majority of security research and practice. Indeed, the very term “trustworthy system ” implicitly encodes the notion that security is a distinct and comprehensive property of the computing artifacts we use: secure against all adversaries and user failings. But history has shown that a perspective solely focused on technical considerations becomes mired in a relentless arms race. More importantly, this perspective misses an entire half of the problem space: the human element. Fundamentally, we care about security only because adversaries are motivated to attack us and because users prove susceptible to being victimized. Our proposal squarely focuses on addressing this other half of the problem space. We hold that while security is a phenomenon mediated by the technical workings of computers and networks, it is ultimately a conflict driven by economic and social issues which merit a commensurate level of scrutiny. Security is a game among actors: adversaries, defenders, and users. Together their behavior defines the shape of the threats we face, how they evolve over time, and, we argue, how they can best be addressed. A Socio-Economic Motivation. The need to address the social and economic elements of security has
(Show Context)

Citation Context

... CNS-0749648, “SGER: Architecting Effective Computer Security Grand Challenges”; and CNS-1015835, “Understanding and Taming the Web’s Privacy Footprint”. Our results to date on these projects include =-=[3, 5, 7, 9, 10, 12, 13, 15, 17, 33, 35, 41, 42, 43, 44, 46, 47, 48, 60, 71, 79, 80, 81, 83, 84, 87, 91, 127, 128, 131, 133, 134, 137, 139, 148, 150, 151, 160, 161, 162, 167, 166, 170]-=-. In the area of network architecture, the work of ICSI investigators spans: ANI-0205519, “Addressing Fundamental Issues for Robust Internet Performance”; CNS-0636539, “Network Fabric for Personal, So...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University