Toward scalable trustworthy computing using the human-physiology-immunity metaphor

Lee Hively, Frederick Sheldon, Anna Squicciarini

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constraints, inherent flaws in "Maginot Line" defenses, and the growing number and sophistication of cyberattacks. This article defines the high-priority problems and examines the potential solution space. In that space, achieving scalable trustworthy computing and communications is possible through real-time knowledge-based decisions about cyber trust. This vision is based on the human-physiology-immunity metaphor and the human brain's ability to extract knowledge from data and information. The article outlines future steps toward scalable trustworthy systems requiring a long-term commitment to solve the well-known challenges.

Original languageEnglish (US)
Article number5560629
Pages (from-to)14-23
Number of pages10
JournalIEEE Security and Privacy
Volume9
Issue number4
DOIs
StatePublished - Jul 1 2011

Fingerprint

Physiology
immunity
physiology
Cloud computing
metaphor
Brain
Defects
Communication
Processing
brain
communications
commitment
energy
ability
resources
knowledge
time
Trusted computing

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law

Cite this

@article{c82794582434486cb3b1b734bad8a335,
title = "Toward scalable trustworthy computing using the human-physiology-immunity metaphor",
abstract = "The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constraints, inherent flaws in {"}Maginot Line{"} defenses, and the growing number and sophistication of cyberattacks. This article defines the high-priority problems and examines the potential solution space. In that space, achieving scalable trustworthy computing and communications is possible through real-time knowledge-based decisions about cyber trust. This vision is based on the human-physiology-immunity metaphor and the human brain's ability to extract knowledge from data and information. The article outlines future steps toward scalable trustworthy systems requiring a long-term commitment to solve the well-known challenges.",
author = "Lee Hively and Frederick Sheldon and Anna Squicciarini",
year = "2011",
month = "7",
day = "1",
doi = "10.1109/MSP.2010.142",
language = "English (US)",
volume = "9",
pages = "14--23",
journal = "IEEE Security and Privacy",
issn = "1540-7993",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

Toward scalable trustworthy computing using the human-physiology-immunity metaphor. / Hively, Lee; Sheldon, Frederick; Squicciarini, Anna.

In: IEEE Security and Privacy, Vol. 9, No. 4, 5560629, 01.07.2011, p. 14-23.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Toward scalable trustworthy computing using the human-physiology-immunity metaphor

AU - Hively, Lee

AU - Sheldon, Frederick

AU - Squicciarini, Anna

PY - 2011/7/1

Y1 - 2011/7/1

N2 - The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constraints, inherent flaws in "Maginot Line" defenses, and the growing number and sophistication of cyberattacks. This article defines the high-priority problems and examines the potential solution space. In that space, achieving scalable trustworthy computing and communications is possible through real-time knowledge-based decisions about cyber trust. This vision is based on the human-physiology-immunity metaphor and the human brain's ability to extract knowledge from data and information. The article outlines future steps toward scalable trustworthy systems requiring a long-term commitment to solve the well-known challenges.

AB - The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constraints, inherent flaws in "Maginot Line" defenses, and the growing number and sophistication of cyberattacks. This article defines the high-priority problems and examines the potential solution space. In that space, achieving scalable trustworthy computing and communications is possible through real-time knowledge-based decisions about cyber trust. This vision is based on the human-physiology-immunity metaphor and the human brain's ability to extract knowledge from data and information. The article outlines future steps toward scalable trustworthy systems requiring a long-term commitment to solve the well-known challenges.

UR - http://www.scopus.com/inward/record.url?scp=80051480254&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80051480254&partnerID=8YFLogxK

U2 - 10.1109/MSP.2010.142

DO - 10.1109/MSP.2010.142

M3 - Article

AN - SCOPUS:80051480254

VL - 9

SP - 14

EP - 23

JO - IEEE Security and Privacy

JF - IEEE Security and Privacy

SN - 1540-7993

IS - 4

M1 - 5560629

ER -