Using Trustworthy Host-Based Information in the Network

Date Added: Oct 2012
Format: PDF

As hardware support for improved end-host security becomes ubiquitous, it is important to consider how network security and performance can benefit from these improvements. If portions of each end-host can be trusted, then network infrastructure no longer needs to arduously and imprecisely reconstruct data already known by the end-hosts. Through the design of a general-purpose architecture the authors call Assayer, they explore issues in providing trusted host-based data, including the balance between useful data and user privacy, and the tradeoffs between security and efficiency. They also evaluate the usefulness of such information in several case studies.