DocumentCode :
1138638
Title :
Fairy dust, secrets, and the real world [computer security]
Author :
Smith, Sean W.
Author_Institution :
Dept. of Comput. Sci., Dartmouth Coll., Hanover, NH, USA
Volume :
1
Issue :
1
fYear :
2003
Firstpage :
89
Lastpage :
93
Abstract :
Computation must exist in the physical world. Security designs that require secrets must hide and use them in the real world. Unfortunately, the real world offers more paths to secret storage and more observable computational artifacts than these security designs anticipate. Careful integration of physical defenses and security architecture can sometimes succeed against the adversary class designers consider. However, in the long term, we hope for either a quantum leap in physically defensible technology-or a significant reduction in the properties that designs force us to assume about our computers.
Keywords :
computer crime; cryptography; security of data; computational artifacts; physical defenses; physically defensible technology; secret storage; security architecture; security designs; Computer architecture; Computer security; Coprocessors; Cryptographic protocols; Cryptography; Electronic mail; Hardware; Identity-based encryption; Privacy; Protection;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSECP.2003.1177003
Filename :
1177003
Link To Document :
بازگشت