Security, functionality and scale? (Invited talk)

被引:0
|
作者
Anderson, Ross [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB3 0FD, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since 2002 the UK has been attempting to build a system of federated databases containing all the nation's medical records. This project has encountered numerous problems and some feel that it is becoming the world's largest ever software disaster. One aspect of the problem is security. This means different things to different stakeholders: the government and its contractors boast about their ability to keep out 'hackers', while medics and patients' groups worry that making records available to large numbers of authorised insiders will lead to abuses that will fatally undermine privacy. A security policy that I developed for the BMA and that I discussed at DBSEC in 2002 was not used; instead the developers went for a combination of role-based access control plus a 'legitimate relationship'. This has been found insufficient and 'sealed envelopes' are planned as well. Medical databases are the first application involving very sensitive personal data being kept in large-scale systems which their operators hope will develop rich functionality over time. This combination of a stringent security requirement, complex functionality and great scale poses the most serious problems yet known to the security architect. I will discuss the options and ask whether it is in fact the case that you can have any two of these attributes - security, functionality and scale - but not all three.
引用
收藏
页码:64 / 64
页数:1
相关论文
共 50 条
  • [1] Retrofitting Legacy Code for Security (Invited Talk)
    Jha, Somesh
    [J]. COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2010, 6174 : 19 - 19
  • [2] Interactive Data Science at Scale Invited Talk
    Bader, David A.
    [J]. PROCEEDINGS OF THE 18TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2021 (CF 2021), 2021, : 210 - 210
  • [3] Security with Noisy Data (Extended Abstract of Invited Talk)
    Skoric, Boris
    [J]. INFORMATION HIDING, 2010, 6387 : 48 - 50
  • [4] Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk
    Regazzoni, Francesco
    Bhasin, Shivam
    Pour, Amir Ali
    Alshaer, Ihab
    Aydin, Furkan
    Aysu, Aydin
    Beroulle, Vincent
    Di Natale, Giorgio
    Franzon, Paul
    Hely, David
    Homma, Naofumi
    Ito, Akira
    Jap, Dirmanto
    Kashyap, Priyank
    Polian, Ilia
    Potluri, Seetal
    Ueno, Rei
    Vatajelu, Elena-Ioana
    Yli-Mayry, Ville
    [J]. 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), 2020,
  • [5] Invited Talk: Software Engineering, AI and autonomous vehicles: Security assurance
    Zheng, James Xi
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
  • [6] Security of Pseudo-Random Number Generators with Input (Invited Talk)
    Vergnaud, Damien
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 43 - 51
  • [7] Does physical security of cryptographic devices need a formal study? (Invited talk)
    Standaert, Francois-Xavier
    Malkin, Tal G.
    Yung, Moti
    [J]. INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 70 - 70
  • [8] Large-Scale Test Automation in the Cloud (Invited Industrial Talk)
    Penix, John
    [J]. 2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 1122 - 1122
  • [9] Kernelization (Invited Talk)
    Fomin, Fedor V.
    [J]. COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2010, 6072 : 107 - 108
  • [10] The Rising Tide Lifts All Boats: The Advancement of Science in Cyber Security (Invited Talk)
    Williams, Laurie
    [J]. ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 1 - 1