{"title":"Network security and storage security: symmetries and symmetry-breaking","authors":"Donald Beaver","doi":"10.1109/SISW.2002.1183504","DOIUrl":null,"url":null,"abstract":"It has been hypothesized that storage security and network security are essentially the same, at least insofar as mapping solutions from one domain in a straightforward manner to the other We discuss similarities and differences that shed some doubt on the propriety of equaling the two. While there are many ways to apply methods from one domain to another, there are fundamental differences between data at rest and data in motion. Storage is often an endpoint as well as a link and it requires different treatment under such circumstances.","PeriodicalId":183673,"journal":{"name":"First International IEEE Security in Storage Workshop, 2002. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"First International IEEE Security in Storage Workshop, 2002. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SISW.2002.1183504","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
It has been hypothesized that storage security and network security are essentially the same, at least insofar as mapping solutions from one domain in a straightforward manner to the other We discuss similarities and differences that shed some doubt on the propriety of equaling the two. While there are many ways to apply methods from one domain to another, there are fundamental differences between data at rest and data in motion. Storage is often an endpoint as well as a link and it requires different treatment under such circumstances.