Science of decentralized security
biblio
Submitted by Katie Dey on Thu, 11/12/2015 - 1:39pm
biblio
Submitted by Katie Dey on Thu, 11/12/2015 - 1:32pm
biblio
Submitted by Katie Dey on Thu, 11/12/2015 - 1:15pm
biblio
Submitted by Katie Dey on Thu, 11/12/2015 - 12:43pm
biblio
Submitted by Katie Dey on Thu, 11/12/2015 - 12:37pm
biblio
Submitted by Katie Dey on Thu, 11/12/2015 - 12:25am
biblio
Submitted by Katie Dey on Thu, 11/12/2015 - 12:22am
group_project
Submitted by Yevgeniy Vorobeychik on Wed, 10/01/2014 - 11:29pm
In security, our concern is typically with securing a particular network, or eliminating security holes in a particular piece of software. These are important, but they miss the fact that being secure is fundamentally about security of all constituent parts, rather that any single part in isolation. In principle, if we can control all the pieces of a system, we can secure all possible channels of attack. Typically, system and security design of various components are performed by different agents, having varying and often conflicting interests.
biblio
Submitted by Yevgeniy Vorobeychik on Wed, 10/01/2014 - 11:27pm