Tolerating penetrations and insider attacks by requiring independent corroboration

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We describe an approach to building a system that meets its requirements even when some central components are successfully penetrated and/or when insiders attack the system. This goal is a key but elusive facet of information survivability. Our approach relies on independent corroboration, a form of redundancy. Corroboration is easy to pin down; independence is not. How can software judge whether two principals are independent? This paper begins to address the problem. We analyze the word "independence" and find that independence is not absolute, but relative to one's interests; that independence judgments are closely tied to trust; that independence judgments are based largely on known connections between the principals. We then take a two-pronged approach. The first prong is a formal, Bayesian probabilistic model of a system that uses independent corroboration to tolerate compromise. The second is a pragmatic investigation of how independence information may be imported from existing authentication data, and a preliminary look at how knowledge of independence may be dynamically obtained from third parties.

Cite

CITATION STYLE

APA

Kahn, C. (1998). Tolerating penetrations and insider attacks by requiring independent corroboration. In Proceedings New Security Paradigms Workshop (Vol. Part F129230, pp. 122–133). Association for Computing Machinery. https://doi.org/10.1145/310889.310926

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free