11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.2. Grand Challenges4. will have the capability to delete their own data which they have created(both from the local storage as well as from the cloud), and5. will, under an appropriate legal framework, have the ability to askpast recipients of their data to erase them as well.• Provide Private Moments in Public Places: Enable users to have privatecommunication in the public areas of the cyberspace. Consider thefollowing analogy: The fact that people are having dinner in a publicrestaurant does not mean that their conversation could be recorded bythe manager of the restaurant, and later made available without theirexplicit consent. Similarly, the fact that people are communicating inthe cyberspace does not imply that parts of their communication can berecorded and used later through means outside their control. We proposeto develop mechanisms that will enable people to have a reasonableexpectation of privacy in what can be conside<strong>red</strong> a public venue in thecyberspace.• Develop Compromise-Tolerant Systems: Provide adequate securitylevels even if components of the system have been compromised. It isreasonable to expect that not all attacks will be detected and successfullymitigated. Human errors, software errors, hardware errors, andinsufficient protection mechanisms will allow some attacks to go throughsuccessfully. This implies that some systems, or components of systemswill be compromised, and this may go undetected for a long periodof time. Given such an environment, we should develop systems thatwill be able to provide decent security guarantees even if some of theircomponents are compromised.5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!