Publication: Research - peer-review › Article in proceedings – Annual report year: 2009
Networked communication systems and the data they make available have, over the last decades, made their way to the very core of both society and business. Not only do they support everyday life and day-to-day operations, in many cases they enable them in the first place, and often are among the most valuable assets. The flexibility that makes them so valuable in the first place, is also their primary vulnerability: via the network, an entity's data is accessible from almost everywhere, often without the need of physical presence in the entity's perimeter. In this work we propose a new security paradigm, that aims at using the network's flexibility to move data and applications away from potential attackers. We also present a possible realization of the proposed paradigm, based on recent advances in language-based security and static analysis, where data and applications are partitioned ahead-of-time and can be moved automatically based on activity both in the network as well as the real world.
|Title of host publication||Proceedings of the New Security Paradigms Workshop|
|State||Published - 2009|
|Event||New Security Paradigms Workshop -|
|Conference||New Security Paradigms Workshop|
|Period||01/01/2009 → …|
|Citations||Error in DOI please contact firstname.lastname@example.org|