The Community for Technology Leaders
Green Image
Issue No. 04 - July-Aug. (2011 vol. 9)
ISSN: 1540-7993
pp: 14-23
Frederick Sheldon , Oak Ridge National Laboratory
Lee Hively , Oak Ridge National Laboratory
Anna Cinzia Squicciarini , Pennsylvania State University
The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constraints, inherent flaws in "Maginot Line" defenses, and the growing number and sophistication of cyberattacks. This article defines the high-priority problems and examines the potential solution space. In that space, achieving scalable trustworthy computing and communications is possible through real-time knowledge-based decisions about cyber trust. This vision is based on the human-physiology-immunity metaphor and the human brain's ability to extract knowledge from data and information. The article outlines future steps toward scalable trustworthy systems requiring a long-term commitment to solve the well-known challenges.
trustworthy computing, scalability, security, nature-inspired cybersecurity, cyber crime
Frederick Sheldon, Lee Hively, Anna Cinzia Squicciarini, "Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor", IEEE Security & Privacy, vol. 9, no. , pp. 14-23, July-Aug. 2011, doi:10.1109/MSP.2010.142
93 ms
(Ver 3.3 (11022016))