{"title":"走向无处不在的合作安全","authors":"P. Robinson","doi":"10.1109/SECCMW.2005.1588301","DOIUrl":null,"url":null,"abstract":"As computer and information systems are now more ubiquitous than humans, so too are the computer-to- computer threats to security and sabotage as compared to purely human-to-human. In everyday life we rely and maintain strong relationships in order to have better guarantees about personal security, as well as to be informed about potentially bad choices for relationships. This paper proposes some logical reasoning, architecture and protocols for providing similar cooperative security infrastructure for ubiquitous computer and information systems.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards ubiquitous cooperative security\",\"authors\":\"P. Robinson\",\"doi\":\"10.1109/SECCMW.2005.1588301\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As computer and information systems are now more ubiquitous than humans, so too are the computer-to- computer threats to security and sabotage as compared to purely human-to-human. In everyday life we rely and maintain strong relationships in order to have better guarantees about personal security, as well as to be informed about potentially bad choices for relationships. This paper proposes some logical reasoning, architecture and protocols for providing similar cooperative security infrastructure for ubiquitous computer and information systems.\",\"PeriodicalId\":382662,\"journal\":{\"name\":\"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-09-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECCMW.2005.1588301\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECCMW.2005.1588301","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
As computer and information systems are now more ubiquitous than humans, so too are the computer-to- computer threats to security and sabotage as compared to purely human-to-human. In everyday life we rely and maintain strong relationships in order to have better guarantees about personal security, as well as to be informed about potentially bad choices for relationships. This paper proposes some logical reasoning, architecture and protocols for providing similar cooperative security infrastructure for ubiquitous computer and information systems.