Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The pervasive trust foundation for security in next generation networks
Lilien L., Al-Alawneh A., Ben Othmane L.  NSPW 2010 (Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, Sep 21-23, 2010)129-142.2010.Type:Proceedings
Date Reviewed: Apr 13 2011

In this paper, Lilien et al. propose the pervasive trust foundation (PTF), a new paradigm for the security of next-generation networks (NGNs). The paper reviews and surveys existing literature and terminology related to the trust aspects of a variety of networking areas.

The authors give a detailed review of the standard security principles of information systems, including confidentiality, integrity, and availability (CIA) and authentication, access control, and nonrepudiation (AAN). As the title suggests, the paper emphasizes the variety of aspects and notions of trust. The authors then extend PTF to the open systems interconnection (OSI) model and beyond. Starting with trust in the small (TIS)--“TIS supports small subsets of security services (SSs), individual SSs or, in the worst case, only portions of individual SSs”--the authors expand this concept to trust in the large (TIL)--“TIL supports either all SSs, or ... large sets of SSs”--which they portray as equivalent to PTF. The paper discusses all of the related issues, problems, and requirements for PTF, and offers a set of recommendations--a basic reference model--for NGNs.

Since this is a conceptual position paper, it should inspire readers to think. It can also be used to help advanced undergraduate and graduate students grasp the standard set of SSs. (Other earlier texts suitable for teaching [1,2], however, also illustrate these concepts.) The authors include a disclaimer that this paper presents their best-effort opinion rather than sound theoretical and practical research; readers should treat it as such.

One of the strengths of this paper is that the authors provide guidelines and research directions for future work. If Lilien et al. ever expand this paper to include credible theory and practice, and combine it with the current work, it could become a must-read journal paper. Until then, it remains an opinion piece, though an interesting and well-illustrated one.

Reviewer:  Serguei A. Mokhov Review #: CR138986 (1110-1105)
1) Rubin, A.D. White-hat security arsenal: tackling the threats. Addison-Wesley, Boston, MA, 2001.
2) US National Research Council. Cybersecurity today and tomorrow: pay now or pay later. National Academy Press, Washington, DC, 2002.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Unauthorized Access (K.6.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Unauthorized Access": Date
Testing and evaluating computer intrusion detection systems
Durst R., Champion T., Witten B., Miller E., Spagnuolo L. Communications of the ACM 42(7): 53-61, 1999. Type: Article
Aug 1 1999
Honeypots: tracking hackers
Spitzner L., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002. Type: Book (9780321108951)
Jan 2 2003
Web hacking: attacks and defense
McClure S., Shah S., Shah S., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  492, Type: Book (9780201761764)
Jul 25 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy