Using Trustworthy Host-Based Information in the Network

As hardware support for improved end-host security becomes ubiquitous, it is important to consider how network security and performance can benefit from these improvements. If portions of each end-host can be trusted, then network infrastructure no longer needs to arduously and imprecisely reconstruct data already known by the end-hosts. Through the design of a general-purpose architecture the authors call Assayer, they explore issues in providing trusted host-based data, including the balance between useful data and user privacy, and the tradeoffs between security and efficiency. They also evaluate the usefulness of such information in several case studies.

Provided by: Association for Computing Machinery Topic: Security Date Added: Oct 2012 Format: PDF

Find By Topic