Target Naming and Service Apoptosis
暂无分享,去创建一个
The volume of traffic on security mailing lists, bulletin boards, news forums, et cetera has grown so sharply in recent times that it is no longer feasible for a systems administrator to follow all relevant news as a background task; it has become a full-time job. Even when relevant information does eventually reach the systems administrator, there is, often a dangerous window between public knowledge of a vulnerability and the administrators ability to correct it. Automated responses mechanisms are the key to closing these vulnerability windows. We propose a database of likely areas of vulnerability, called targets, in a machine readable and filterable manner so that administrators can greatly reduce the amount of security mail to be read. We then propose a cryptographically secure service with which semi-trusted third parties can act in a manner limited by the system administrator, say shutting down a specific service while not allowing general access, to diminish the window of vulnerability.
[1] Christian F. Tschudin,et al. Apoptosis - the Programmed Death of Distributed Services , 2001, Secure Internet Programming.
[2] Saul A. Kripke,et al. Naming and Necessity , 1980 .
[3] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[4] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..