Securing information transmission by redundancy

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Many approaches have been used or proposed for providing security for information dissemination oyer networks, including encryption, authentication, and digital signatures. These mechanisms do not, however, necessarily help ensure that a message is delivered at all. Attacks that try to destroy or intercept security messages require other mechanisms. Authenticated acknowledgements are sometimes useful for this purpose, but do not scale well. This paper discusses the use of redundancy to combat attempts to prevent information dissemination. Redundancy has been widely used in other areas, such as high availability data storage, file replication, and some fault-tolerant systems. The security problem has different characteristics that require different approaches to redundancy. We present one example of using redundancy to increase assurance of security updates delivery.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Li, J., Reiher, P., & Popek, G. (1999). Securing information transmission by redundancy. In Proceedings New Security Paradigm Workshop (pp. 112–117). https://doi.org/10.1145/335169.335205

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 2

40%

Researcher 2

40%

Professor / Associate Prof. 1

20%

Readers' Discipline

Tooltip

Computer Science 3

50%

Business, Management and Accounting 1

17%

Engineering 1

17%

Materials Science 1

17%

Save time finding and organizing research with Mendeley

Sign up for free