Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Network traffic tracking systems: folly in the large?
Proceedings of the 2000 workshop on New security paradigms
QoS Negotiation in Real-Time Systems and Its Application to Automated Flight Control
IEEE Transactions on Computers
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A genetic agent-based negotiation system
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE/ACM Transactions on Networking (TON)
IEEE Internet Computing
JSSPP '02 Revised Papers from the 8th International Workshop on Job Scheduling Strategies for Parallel Processing
SCENS: a system for the mediated sharing of sensitive data
Proceedings of the 3rd ACM/IEEE-CS joint conference on Digital libraries
"Goodies" in Exchange for Consumer Information on the Internet: The Economics and Issues
HICSS '98 Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences-Volume 4 - Volume 4
Holding intruders accountable on the Internet
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
A hybrid negotiation strategy mechanism in an automated negotiation system
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
On the value of private information
TARK '01 Proceedings of the 8th conference on Theoretical aspects of rationality and knowledge
Tracing Anonymous Packets to Their Approximate Source
LISA '00 Proceedings of the 14th USENIX conference on System administration
IEEE Security and Privacy
The security and privacy implications of using social networks to deliver healthcare
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies
Hi-index | 0.00 |
From a cyber-security perspective, attribution is considered to be the ability to determine the originating location for an attack. However, should such an attribution system be developed and deployed, it would provide attribution for all traffic, not just attack traffic. This has several implications for both the senders and receivers of traffic, as well as the intervening organizations, Internet service providers and nation-states. In this paper we examine the requirements for an attribution system, identifying all of the actors, their potential interests, and the resulting policies they might therefore have. We provide a general framework that represents the attribution problem, and outline the technical and policy requirements for a solution. We discuss the inevitable policy conflicts due to the social, legal and cultural issues that would surround such a system.