Security

Using Trustworthy Host-Based Information in the Network

Download Now Free registration required

Executive Summary

As hardware support for improved end-host security becomes ubiquitous, it is important to consider how network security and performance can benefit from these improvements. If portions of each end-host can be trusted, then network infrastructure no longer needs to arduously and imprecisely reconstruct data already known by the end-hosts. Through the design of a general-purpose architecture the authors call Assayer, they explore issues in providing trusted host-based data, including the balance between useful data and user privacy, and the tradeoffs between security and efficiency. They also evaluate the usefulness of such information in several case studies.

  • Format: PDF
  • Size: 262.21 KB