Building trustworthy systems: lessons from the PTN and Internet
The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, m...
Gespeichert in:
Veröffentlicht in: | IEEE internet computing 1999-11, Vol.3 (6), p.64-72 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 72 |
---|---|
container_issue | 6 |
container_start_page | 64 |
container_title | IEEE internet computing |
container_volume | 3 |
creator | Schneider, F.B. Bellovin, S.M. Inouye, A.S. |
description | The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, manages, or can even have a complete picture of either. Both networks involve large numbers of subsystems operated by different organizations. The number and intricate nature of the interfaces that exist at the boundaries of these subsystems are one source of complexity; the increasing popularity of advanced services is a second source. This article discusses vulnerabilities in the PTN and Internet, identifying ways new research might help to eliminate those vulnerabilities. |
doi_str_mv | 10.1109/4236.807013 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_4236_807013</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>807013</ieee_id><sourcerecordid>1424141561</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-ae271bdb59b4cde9d16264bb11009ad89196e1b648b2932ef16c63cc23313b863</originalsourceid><addsrcrecordid>eNqF0T1PwzAQBuAIgUQpTGxMFgMMKMVnu47NgqDio1IFDGW28nGhqdKk2I5Q_z2uUjEwwHQn3aPTnd4oOgU6AqD6WjAuR4omFPheNAAtIA4t7IeeKh0nisJhdOTcklKqFINBdHvfVXVRNR_E2875r9b6xYa4jfO4cjekRufaxpHStiviF0je5i8kbQoybTzaBv1xdFCmtcOTXR1G748P88lzPHt9mk7uZnEuqPJxiiyBrMjGOhN5gboAyaTIsnA11WmhNGiJkEmhMqY5wxJkLnmeM86BZ0ryYXTZ713b9rND582qcjnWddpg2zkTFmiAsUyCvPhTMpWAkEz8D6VKhNAswPNfcNl2tgnvGtAJZ4orHdBVj3LbOmexNGtbrVK7MUDNNhyzDcf04QR91usKEX_kbvgNYtaHhA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>197328389</pqid></control><display><type>article</type><title>Building trustworthy systems: lessons from the PTN and Internet</title><source>IEEE Electronic Library (IEL)</source><creator>Schneider, F.B. ; Bellovin, S.M. ; Inouye, A.S.</creator><creatorcontrib>Schneider, F.B. ; Bellovin, S.M. ; Inouye, A.S.</creatorcontrib><description>The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, manages, or can even have a complete picture of either. Both networks involve large numbers of subsystems operated by different organizations. The number and intricate nature of the interfaces that exist at the boundaries of these subsystems are one source of complexity; the increasing popularity of advanced services is a second source. This article discusses vulnerabilities in the PTN and Internet, identifying ways new research might help to eliminate those vulnerabilities.</description><identifier>ISSN: 1089-7801</identifier><identifier>EISSN: 1941-0131</identifier><identifier>DOI: 10.1109/4236.807013</identifier><identifier>CODEN: IICOFX</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>Availability ; Boundaries ; Computation ; Computer errors ; Computer science ; Costs ; Developers ; Humans ; Information systems ; Internet ; Internet telephony ; Networks ; Operators ; Security ; Sheds ; Software systems ; SONET</subject><ispartof>IEEE internet computing, 1999-11, Vol.3 (6), p.64-72</ispartof><rights>Copyright IEEE Computer Society Nov 1999</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-ae271bdb59b4cde9d16264bb11009ad89196e1b648b2932ef16c63cc23313b863</citedby><cites>FETCH-LOGICAL-c408t-ae271bdb59b4cde9d16264bb11009ad89196e1b648b2932ef16c63cc23313b863</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/807013$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/807013$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Schneider, F.B.</creatorcontrib><creatorcontrib>Bellovin, S.M.</creatorcontrib><creatorcontrib>Inouye, A.S.</creatorcontrib><title>Building trustworthy systems: lessons from the PTN and Internet</title><title>IEEE internet computing</title><addtitle>MIC</addtitle><description>The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, manages, or can even have a complete picture of either. Both networks involve large numbers of subsystems operated by different organizations. The number and intricate nature of the interfaces that exist at the boundaries of these subsystems are one source of complexity; the increasing popularity of advanced services is a second source. This article discusses vulnerabilities in the PTN and Internet, identifying ways new research might help to eliminate those vulnerabilities.</description><subject>Availability</subject><subject>Boundaries</subject><subject>Computation</subject><subject>Computer errors</subject><subject>Computer science</subject><subject>Costs</subject><subject>Developers</subject><subject>Humans</subject><subject>Information systems</subject><subject>Internet</subject><subject>Internet telephony</subject><subject>Networks</subject><subject>Operators</subject><subject>Security</subject><subject>Sheds</subject><subject>Software systems</subject><subject>SONET</subject><issn>1089-7801</issn><issn>1941-0131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1999</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0T1PwzAQBuAIgUQpTGxMFgMMKMVnu47NgqDio1IFDGW28nGhqdKk2I5Q_z2uUjEwwHQn3aPTnd4oOgU6AqD6WjAuR4omFPheNAAtIA4t7IeeKh0nisJhdOTcklKqFINBdHvfVXVRNR_E2875r9b6xYa4jfO4cjekRufaxpHStiviF0je5i8kbQoybTzaBv1xdFCmtcOTXR1G748P88lzPHt9mk7uZnEuqPJxiiyBrMjGOhN5gboAyaTIsnA11WmhNGiJkEmhMqY5wxJkLnmeM86BZ0ryYXTZ713b9rND582qcjnWddpg2zkTFmiAsUyCvPhTMpWAkEz8D6VKhNAswPNfcNl2tgnvGtAJZ4orHdBVj3LbOmexNGtbrVK7MUDNNhyzDcf04QR91usKEX_kbvgNYtaHhA</recordid><startdate>19991101</startdate><enddate>19991101</enddate><creator>Schneider, F.B.</creator><creator>Bellovin, S.M.</creator><creator>Inouye, A.S.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7SC</scope><scope>8FD</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>19991101</creationdate><title>Building trustworthy systems: lessons from the PTN and Internet</title><author>Schneider, F.B. ; Bellovin, S.M. ; Inouye, A.S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-ae271bdb59b4cde9d16264bb11009ad89196e1b648b2932ef16c63cc23313b863</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1999</creationdate><topic>Availability</topic><topic>Boundaries</topic><topic>Computation</topic><topic>Computer errors</topic><topic>Computer science</topic><topic>Costs</topic><topic>Developers</topic><topic>Humans</topic><topic>Information systems</topic><topic>Internet</topic><topic>Internet telephony</topic><topic>Networks</topic><topic>Operators</topic><topic>Security</topic><topic>Sheds</topic><topic>Software systems</topic><topic>SONET</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Schneider, F.B.</creatorcontrib><creatorcontrib>Bellovin, S.M.</creatorcontrib><creatorcontrib>Inouye, A.S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics & Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE internet computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Schneider, F.B.</au><au>Bellovin, S.M.</au><au>Inouye, A.S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Building trustworthy systems: lessons from the PTN and Internet</atitle><jtitle>IEEE internet computing</jtitle><stitle>MIC</stitle><date>1999-11-01</date><risdate>1999</risdate><volume>3</volume><issue>6</issue><spage>64</spage><epage>72</epage><pages>64-72</pages><issn>1089-7801</issn><eissn>1941-0131</eissn><coden>IICOFX</coden><abstract>The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, manages, or can even have a complete picture of either. Both networks involve large numbers of subsystems operated by different organizations. The number and intricate nature of the interfaces that exist at the boundaries of these subsystems are one source of complexity; the increasing popularity of advanced services is a second source. This article discusses vulnerabilities in the PTN and Internet, identifying ways new research might help to eliminate those vulnerabilities.</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/4236.807013</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1089-7801 |
ispartof | IEEE internet computing, 1999-11, Vol.3 (6), p.64-72 |
issn | 1089-7801 1941-0131 |
language | eng |
recordid | cdi_crossref_primary_10_1109_4236_807013 |
source | IEEE Electronic Library (IEL) |
subjects | Availability Boundaries Computation Computer errors Computer science Costs Developers Humans Information systems Internet Internet telephony Networks Operators Security Sheds Software systems SONET |
title | Building trustworthy systems: lessons from the PTN and Internet |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T19%3A09%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Building%20trustworthy%20systems:%20lessons%20from%20the%20PTN%20and%20Internet&rft.jtitle=IEEE%20internet%20computing&rft.au=Schneider,%20F.B.&rft.date=1999-11-01&rft.volume=3&rft.issue=6&rft.spage=64&rft.epage=72&rft.pages=64-72&rft.issn=1089-7801&rft.eissn=1941-0131&rft.coden=IICOFX&rft_id=info:doi/10.1109/4236.807013&rft_dat=%3Cproquest_RIE%3E1424141561%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=197328389&rft_id=info:pmid/&rft_ieee_id=807013&rfr_iscdi=true |