Entry Traynor:2008:NMH from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Traynor:2008:NMH,
  author =       "Patrick Traynor and Michael Chien and Scott Weaver and
                 Boniface Hicks and Patrick McDaniel",
  title =        "Noninvasive Methods for Host Certification",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "3",
  pages =        "16:1--16:??",
  month =        mar,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1341731.1341737",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:50 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Determining whether a user or system is exercising
                 appropriate security practices is difficult in any
                 context. Such difficulties are particularly pronounced
                 when uncontrolled or unknown platforms join public
                 networks. Commonly practiced techniques used to vet
                 these hosts, such as system scans, have the potential
                 to infringe on the privacy of users. In this article,
                 we show that it is possible for clients to prove both
                 the presence and proper functioning of security
                 infrastructure without allowing unrestricted access to
                 their system. We demonstrate this approach,
                 specifically applied to antivirus security, by
                 requiring clients seeking admission to a network to
                 positively identify the presence or absence of malcode
                 in a series of puzzles. The implementation of this
                 mechanism and its application to real networks are also
                 explored. In so doing, we demonstrate that it is not
                 necessary for an administrator to be invasive to
                 determine whether a client implements required security
                 practices.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "assurance; certification; malware; network security",
}

Related entries