Affiliation:
1. AT&T Labs, Florham Park, NJ
2. Johns Hopkins University, Baltimore, MD
Abstract
We discuss the dangers that scalable Internet functionality may present to the real world, focusing upon an attack that is simple, yet can have great impact, which we believe may occur quite soon. We offer and critique various solutions to this class of attack and hope to provide a warning to the Internet community of what is currently possible. The attack is, to some degree, a consequence of the availability of private information on the Web, and the increase in the amount of personal information that users must reveal to obtain Web services.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications
Reference15 articles.
1. Byers S. Silva C. and Freire J. 2001. Imaging web databases with restricted query access.]] Byers S. Silva C. and Freire J. 2001. Imaging web databases with restricted query access.]]
2. Cheswick B. and Bellovin S. 1994. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Publishing Company.]] Cheswick B. and Bellovin S. 1994. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Publishing Company.]]
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献