Proceedings of the 2000 Workshop on New Security Paradigms 2001
DOI: 10.1145/366173.366208
|View full text |Cite
|
Sign up to set email alerts
|

Multilateral security a concept and examples for balanced security

Abstract: #Multilateral security considers different and possibly conflicting security requirements of different parties and strives to balance these requirements. This paper introduces the concept of multilateral security giving some example problems and solutions. It focuses on a personal reachability and security management system that was developed to overcome the caller ID conflict. The prototype and its relation to multilateral security are described. Further, some major real world assessments of the prototype and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0
2

Year Published

2001
2001
2010
2010

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 60 publications
(44 citation statements)
references
References 3 publications
0
42
0
2
Order By: Relevance
“…The concept of "privacy assistants" is also central to work by Rannenberg et al and Jendricke and Gerd tom Markotten on reachability managers [162,243]. Jendricke and Gerd tom Markotten claim that PETs can help people negotiate their privacy "boundary" by associating different privacy profiles with several digital "identities.…”
Section: Identity Management and Anonymizationmentioning
confidence: 99%
See 1 more Smart Citation
“…The concept of "privacy assistants" is also central to work by Rannenberg et al and Jendricke and Gerd tom Markotten on reachability managers [162,243]. Jendricke and Gerd tom Markotten claim that PETs can help people negotiate their privacy "boundary" by associating different privacy profiles with several digital "identities.…”
Section: Identity Management and Anonymizationmentioning
confidence: 99%
“…Multilateral security was applied to several case studies, including a deployment of a prototype mobile application for "reachability" management for medical professionals (i.e., brokering availability to incoming phone calls) [243].…”
Section: Analytic Frameworkmentioning
confidence: 99%
“…Multilaterally secure systems take into account security require-ments of all involved parties and aim at balancing contrary interests in an acceptable way [43].…”
Section: Multilateral Security and The Role Of Accountabilitymentioning
confidence: 99%
“…Obviously, there is no simple answer on how to deal with such inherent security conflicts. The fundamental research question, that our work addresses, is how and to which extend it is possible to realize multilaterally secure [43], i.e. balanced and thus trustworthy, collaborations supported by modern ICT.…”
Section: Introductionmentioning
confidence: 99%
“…Rannenberg (2001) discusses multilateral security in which security policies of different parties may conflict and gives some examples and solutions to resolve the conflicts. In considering that different interests must be respected, Rannenberg (2001) confirms our ideas that a) different parties may have different (or personal) security goals, b) these parties can specify their own interests or security goals, and c) conflicts may be negotiated. Torrellas et al (2003) propose the use of multiagent security systems to react to a changing threat environment due to new virus attacks, active intrusions, and new attack technologies.…”
Section: Category Iii)mentioning
confidence: 99%