Building trustworthy systems: lessons from the PTN and Internet

The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, m...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet computing 1999-11, Vol.3 (6), p.64-72
Hauptverfasser: Schneider, F.B., Bellovin, S.M., Inouye, A.S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 72
container_issue 6
container_start_page 64
container_title IEEE internet computing
container_volume 3
creator Schneider, F.B.
Bellovin, S.M.
Inouye, A.S.
description The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, manages, or can even have a complete picture of either. Both networks involve large numbers of subsystems operated by different organizations. The number and intricate nature of the interfaces that exist at the boundaries of these subsystems are one source of complexity; the increasing popularity of advanced services is a second source. This article discusses vulnerabilities in the PTN and Internet, identifying ways new research might help to eliminate those vulnerabilities.
doi_str_mv 10.1109/4236.807013
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_4236_807013</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>807013</ieee_id><sourcerecordid>1424141561</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-ae271bdb59b4cde9d16264bb11009ad89196e1b648b2932ef16c63cc23313b863</originalsourceid><addsrcrecordid>eNqF0T1PwzAQBuAIgUQpTGxMFgMMKMVnu47NgqDio1IFDGW28nGhqdKk2I5Q_z2uUjEwwHQn3aPTnd4oOgU6AqD6WjAuR4omFPheNAAtIA4t7IeeKh0nisJhdOTcklKqFINBdHvfVXVRNR_E2875r9b6xYa4jfO4cjekRufaxpHStiviF0je5i8kbQoybTzaBv1xdFCmtcOTXR1G748P88lzPHt9mk7uZnEuqPJxiiyBrMjGOhN5gboAyaTIsnA11WmhNGiJkEmhMqY5wxJkLnmeM86BZ0ryYXTZ713b9rND582qcjnWddpg2zkTFmiAsUyCvPhTMpWAkEz8D6VKhNAswPNfcNl2tgnvGtAJZ4orHdBVj3LbOmexNGtbrVK7MUDNNhyzDcf04QR91usKEX_kbvgNYtaHhA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>197328389</pqid></control><display><type>article</type><title>Building trustworthy systems: lessons from the PTN and Internet</title><source>IEEE Electronic Library (IEL)</source><creator>Schneider, F.B. ; Bellovin, S.M. ; Inouye, A.S.</creator><creatorcontrib>Schneider, F.B. ; Bellovin, S.M. ; Inouye, A.S.</creatorcontrib><description>The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, manages, or can even have a complete picture of either. Both networks involve large numbers of subsystems operated by different organizations. The number and intricate nature of the interfaces that exist at the boundaries of these subsystems are one source of complexity; the increasing popularity of advanced services is a second source. This article discusses vulnerabilities in the PTN and Internet, identifying ways new research might help to eliminate those vulnerabilities.</description><identifier>ISSN: 1089-7801</identifier><identifier>EISSN: 1941-0131</identifier><identifier>DOI: 10.1109/4236.807013</identifier><identifier>CODEN: IICOFX</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>Availability ; Boundaries ; Computation ; Computer errors ; Computer science ; Costs ; Developers ; Humans ; Information systems ; Internet ; Internet telephony ; Networks ; Operators ; Security ; Sheds ; Software systems ; SONET</subject><ispartof>IEEE internet computing, 1999-11, Vol.3 (6), p.64-72</ispartof><rights>Copyright IEEE Computer Society Nov 1999</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-ae271bdb59b4cde9d16264bb11009ad89196e1b648b2932ef16c63cc23313b863</citedby><cites>FETCH-LOGICAL-c408t-ae271bdb59b4cde9d16264bb11009ad89196e1b648b2932ef16c63cc23313b863</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/807013$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/807013$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Schneider, F.B.</creatorcontrib><creatorcontrib>Bellovin, S.M.</creatorcontrib><creatorcontrib>Inouye, A.S.</creatorcontrib><title>Building trustworthy systems: lessons from the PTN and Internet</title><title>IEEE internet computing</title><addtitle>MIC</addtitle><description>The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, manages, or can even have a complete picture of either. Both networks involve large numbers of subsystems operated by different organizations. The number and intricate nature of the interfaces that exist at the boundaries of these subsystems are one source of complexity; the increasing popularity of advanced services is a second source. This article discusses vulnerabilities in the PTN and Internet, identifying ways new research might help to eliminate those vulnerabilities.</description><subject>Availability</subject><subject>Boundaries</subject><subject>Computation</subject><subject>Computer errors</subject><subject>Computer science</subject><subject>Costs</subject><subject>Developers</subject><subject>Humans</subject><subject>Information systems</subject><subject>Internet</subject><subject>Internet telephony</subject><subject>Networks</subject><subject>Operators</subject><subject>Security</subject><subject>Sheds</subject><subject>Software systems</subject><subject>SONET</subject><issn>1089-7801</issn><issn>1941-0131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1999</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0T1PwzAQBuAIgUQpTGxMFgMMKMVnu47NgqDio1IFDGW28nGhqdKk2I5Q_z2uUjEwwHQn3aPTnd4oOgU6AqD6WjAuR4omFPheNAAtIA4t7IeeKh0nisJhdOTcklKqFINBdHvfVXVRNR_E2875r9b6xYa4jfO4cjekRufaxpHStiviF0je5i8kbQoybTzaBv1xdFCmtcOTXR1G748P88lzPHt9mk7uZnEuqPJxiiyBrMjGOhN5gboAyaTIsnA11WmhNGiJkEmhMqY5wxJkLnmeM86BZ0ryYXTZ713b9rND582qcjnWddpg2zkTFmiAsUyCvPhTMpWAkEz8D6VKhNAswPNfcNl2tgnvGtAJZ4orHdBVj3LbOmexNGtbrVK7MUDNNhyzDcf04QR91usKEX_kbvgNYtaHhA</recordid><startdate>19991101</startdate><enddate>19991101</enddate><creator>Schneider, F.B.</creator><creator>Bellovin, S.M.</creator><creator>Inouye, A.S.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7SC</scope><scope>8FD</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>19991101</creationdate><title>Building trustworthy systems: lessons from the PTN and Internet</title><author>Schneider, F.B. ; Bellovin, S.M. ; Inouye, A.S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-ae271bdb59b4cde9d16264bb11009ad89196e1b648b2932ef16c63cc23313b863</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1999</creationdate><topic>Availability</topic><topic>Boundaries</topic><topic>Computation</topic><topic>Computer errors</topic><topic>Computer science</topic><topic>Costs</topic><topic>Developers</topic><topic>Humans</topic><topic>Information systems</topic><topic>Internet</topic><topic>Internet telephony</topic><topic>Networks</topic><topic>Operators</topic><topic>Security</topic><topic>Sheds</topic><topic>Software systems</topic><topic>SONET</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Schneider, F.B.</creatorcontrib><creatorcontrib>Bellovin, S.M.</creatorcontrib><creatorcontrib>Inouye, A.S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE internet computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Schneider, F.B.</au><au>Bellovin, S.M.</au><au>Inouye, A.S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Building trustworthy systems: lessons from the PTN and Internet</atitle><jtitle>IEEE internet computing</jtitle><stitle>MIC</stitle><date>1999-11-01</date><risdate>1999</risdate><volume>3</volume><issue>6</issue><spage>64</spage><epage>72</epage><pages>64-72</pages><issn>1089-7801</issn><eissn>1941-0131</eissn><coden>IICOFX</coden><abstract>The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, manages, or can even have a complete picture of either. Both networks involve large numbers of subsystems operated by different organizations. The number and intricate nature of the interfaces that exist at the boundaries of these subsystems are one source of complexity; the increasing popularity of advanced services is a second source. This article discusses vulnerabilities in the PTN and Internet, identifying ways new research might help to eliminate those vulnerabilities.</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/4236.807013</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1089-7801
ispartof IEEE internet computing, 1999-11, Vol.3 (6), p.64-72
issn 1089-7801
1941-0131
language eng
recordid cdi_crossref_primary_10_1109_4236_807013
source IEEE Electronic Library (IEL)
subjects Availability
Boundaries
Computation
Computer errors
Computer science
Costs
Developers
Humans
Information systems
Internet
Internet telephony
Networks
Operators
Security
Sheds
Software systems
SONET
title Building trustworthy systems: lessons from the PTN and Internet
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T19%3A09%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Building%20trustworthy%20systems:%20lessons%20from%20the%20PTN%20and%20Internet&rft.jtitle=IEEE%20internet%20computing&rft.au=Schneider,%20F.B.&rft.date=1999-11-01&rft.volume=3&rft.issue=6&rft.spage=64&rft.epage=72&rft.pages=64-72&rft.issn=1089-7801&rft.eissn=1941-0131&rft.coden=IICOFX&rft_id=info:doi/10.1109/4236.807013&rft_dat=%3Cproquest_RIE%3E1424141561%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=197328389&rft_id=info:pmid/&rft_ieee_id=807013&rfr_iscdi=true