Proceedings of the 1996 Workshop on New Security Paradigms - NSPW '96 1996
DOI: 10.1145/304851.304855
|View full text |Cite
|
Sign up to set email alerts
|

The Emperor's old armor

Abstract: The traditional model of computer security was formulated in the 1970's, when computers were espensive, solitary, heavy, and rare. It rests on three fundamental foundations: management of security policy describing the set of actions each user is entit.led to perform, integrity of the physical system, its software, and especially its security-enforcing mechanisms, and secrecy of cryptographic keys and sensitive data.The modern computing environment, with its rapidly accelerating complexity, connectivity, and m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

1996
1996
2017
2017

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(26 citation statements)
references
References 21 publications
0
26
0
Order By: Relevance
“…A major difference between game addiction and some other addictions is the fact that the causes of addiction are due to design activities rather than natural properties. Whereas certain natural phenomena have inherent addictive properties, behavioral game design involves imposed addictive properties (Blakley 1996).…”
Section: Addictionmentioning
confidence: 99%
“…A major difference between game addiction and some other addictions is the fact that the causes of addiction are due to design activities rather than natural properties. Whereas certain natural phenomena have inherent addictive properties, behavioral game design involves imposed addictive properties (Blakley 1996).…”
Section: Addictionmentioning
confidence: 99%
“…Therefore, space (and to some extent, computation time) can be used as a bottleneck; this has for example been proposed for e-cash [4]. In our case, we can make the authentication to some service requires a one gigabyte key.…”
Section: Storage Spacementioning
confidence: 99%
“…In that case, I agree with him that access control policies are very difficult to administer, and don't scale in any dimension; they are limited both in the number of subjects, functions, objects, operations, and classes, and in breadth of control. Further, as both Wulf et al [ WUL96] and Greenwald [GRE96] point out, today's distributed environments require multiple protection philosophies and policies.2…”
Section: Policymentioning
confidence: 99%