Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Security and network effects: centralized and decentralized perspectives

Security and network effects: centralized and decentralized perspectives Security and Network E €ects: Centralized and Decentralized Perspectives YEVGENIY VOROBEYCHIK Sandia National Laboratories, Livermore, CA1 Security, like many other complex decisions, is generally approached with a divide-and-conquer mindset. Consequences of security failures, however, can rarely be completely localized: an explosion or a re at one building can a €ect neighboring structures, a debt crisis in Greece resonates throughout the tightly connected European and US nancial markets, and a breach of security at one computer can facilitate access to others on the same network. It is thus crucial to view security holistically, and devise security strategies that explicitly account for interdependencies between valuable assets. Here we provide an overview of two recent approaches to security with network e €ects. The rst approach takes a centralized perspective, attempting to compute an optimal security con guration for all interdependent assets. This approach explicitly accounts for an intelligent adversary optimally attacking one of the assets. The second approach studies the impact of decentralized decision making when local failures can propagate in complex ways through the entire system, but assumes that initial failures are random. Categories and Subject Descriptors: I.2.11 [Arti cial Intelligence]: Distributed arti cial intelligence ”Intelligent agents General Terms: Algorithms, http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGecom Exchanges Association for Computing Machinery

Security and network effects: centralized and decentralized perspectives

ACM SIGecom Exchanges , Volume 10 (3) – Dec 1, 2011

Loading next page...
 
/lp/association-for-computing-machinery/security-and-network-effects-centralized-and-decentralized-o7UEdQY52S
Publisher
Association for Computing Machinery
Copyright
Copyright © 2011 by ACM Inc.
ISSN
1551-9031
DOI
10.1145/2325702.2325707
Publisher site
See Article on Publisher Site

Abstract

Security and Network E €ects: Centralized and Decentralized Perspectives YEVGENIY VOROBEYCHIK Sandia National Laboratories, Livermore, CA1 Security, like many other complex decisions, is generally approached with a divide-and-conquer mindset. Consequences of security failures, however, can rarely be completely localized: an explosion or a re at one building can a €ect neighboring structures, a debt crisis in Greece resonates throughout the tightly connected European and US nancial markets, and a breach of security at one computer can facilitate access to others on the same network. It is thus crucial to view security holistically, and devise security strategies that explicitly account for interdependencies between valuable assets. Here we provide an overview of two recent approaches to security with network e €ects. The rst approach takes a centralized perspective, attempting to compute an optimal security con guration for all interdependent assets. This approach explicitly accounts for an intelligent adversary optimally attacking one of the assets. The second approach studies the impact of decentralized decision making when local failures can propagate in complex ways through the entire system, but assumes that initial failures are random. Categories and Subject Descriptors: I.2.11 [Arti cial Intelligence]: Distributed arti cial intelligence ”Intelligent agents General Terms: Algorithms,

Journal

ACM SIGecom ExchangesAssociation for Computing Machinery

Published: Dec 1, 2011

There are no references for this article.