Panel Presentation: (Future) Practices for Protecting Your Digital Assets. Prof. Gene Tsudik Associate Dean of Research & Graduate Studies Donald Bren School of Information & Computer Sciences University of California, Irvine [email protected] http://sconce.ics.uci.edu. (my) Research.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Prof. Gene Tsudik
Associate Dean of Research & Graduate Studies
Donald Bren School of Information & Computer Sciences
University of California, Irvine
Current: Digital Assets
DSL/Cable/Satellite to home / business
Ethernet or 802.11 within home / business
hi-bw wireless (e.g., beamed from light-pole-mounted Access Points) might replace cable & DSL/phone wires
Providers need techniques to detect/inhibit subscribers who are wittingly or unwittingly "split” bandwidth, e.g., provider-supplied devices may need to police/inhibit out-of-perimeter incoming (wireless) traffic.
Would be nice if:
Phishing & related fraud: Digital AssetsHow to make things better?