Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • IT Management

    Trust is a Precursor to Net Services

    Written by

    Peter Coffee
    Published January 22, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      When people want to tell me what theyre against, I usually counter by asking what theyre for. Only in politics can we say that “the enemy of my enemy is my friend”: in technology, its much more difficult to find compatible friendships when the only common ground is a shared dislike.

      Unsolicited commercial e-mail, or “spam” if you prefer, is a perfect example. We may all agree that were against its abuse, and there are any number of ways to control the problem, but each of them threatens someones distinctive view of what the Internet and e-mail ought to be able to do. A sender-pays system limits the important role of e-mail in consumer activism and political speech. A “white list” system of accepted senders prevents legitimate new market entrants from reaching potential willing customers. A “black list” system of known e-mail abusers triggers a costly arms race involving spammers, service providers, IT hardware and software providers and enterprise e-mail administrators.

      What makes a solution much more urgent is the evolution of Internet traffic beyond the model of publishing pages and sending person-to-person messages. Device-to-device and process-to-process communication must rest on a trustworthy foundation that limits traffic to what we wish to receive, or at least provides accountability for the effects of what we knowingly or unknowingly accept.

      The Internet as application platform is both more powerful and less observable than the Internet as faculty lunchroom, as this formerly academic network was once described.

      Given that complexity and urgency, Im willing to go along with the “what were against” approach of the Messaging Anti-Abuse Working Group whose formation was announced in Boston last week. I spoke with Dale Malik, director of Communications Product Development for BellSouth, and with Rich Wong (general manager of messaging applications) and Omar Tellez (senior director of product development) at Openwave, representing two of MAAWGs 22 member ISPs and messaging services companies that collectively represent 80 million Internet users. We quickly converged on two key ideas: the nature of trust on the network, and the importance of reliable identification.

      “Identification is an absolute baseline requirement,” said Malik, but this doesnt mean the end of anonymity where thats an important part of what the Internet provides. He went on to add, “at the network operator level, not at the end user level.” He compared Internet messaging to existing telecommunication industry arrangements: “In the telephony world, we have inter-carrier exchange agreements. Things like cellphone roaming have been effectively resolved, and I think we have the intellectual capital to resolve these things in similar ways,” he predicted.

      Openwaves Wong compared security for Internet messaging to the current practices applied in air travel. “If youre flying in from Canada, I dont ask for your fingerprint,” he observed; “if youre flying in from [some other countries], I might. If were able to prevent identity forgery, or IP spoofing, so that I know whos attempting a connection with me, then I can place that party in one of my concentric circles of trust: I can apply policy against good guys and bad guys and everyone in between. I can apply expensive techniques against the ten per cent of the stream thats likely to be a problem, without wasting that expense against the twenty per cent or more of the traffic thats highly trustworthy,” Wong concluded.

      In Web services protocols today, security is not a gaping hole, but neither is it a core component of the services proposition. During a recent round-table discussion of Web services with key industry players and analysts, consultant Doug Kaye of RDS Strategies LLC observed that “if you control the authentication mechanisms on all ends of the system, then securitys going to be in pretty good shape rather quickly. If you have to go into an environment where you have to deal with security policies that are controlled by multiple organizations, thats not doable today in Web services”–that is, he added, not without moving beyond the boundaries of open standards.

      Authentication remains a weak point in other aspects of network operation as well, exemplified by the January 9th advisory concerning an authentication loophole in Cisco Personal Assistant. Developers targeting the .Net framework have many powerful tools at their disposal, but it requires some effort to master them. Other potentially secure platforms like Apples Mac OS X are maturing quickly with the aid of third-party enhancements like CryptoCard Corp.s Crypto-Server X, recipient of best-of-show honors at this months MacWorld Expo.

      With identification schemes moving to the next level of reliability and transparency, said Openwaves Wong, service operators will have the same edge as crack teams of blackjack players, like the team from MIT thats profiled in the book, “Bringing Down the House.” With network operators knowing each other and being able to associate connections and traffic with levels of trust, said Wong, “people can play into high-probability situations.” Not perfect solutions, but a dramatic shifting of the odds in favor of legitimate users of the network–because todays near-ignorance of whos doing what is one enemy that we all share.

      What fatal flaws would you reject in an anti-spam solution?

      Peter Coffee
      Peter Coffee
      Peter Coffee is Director of Platform Research at salesforce.com, where he serves as a liaison with the developer community to define the opportunity and clarify developers' technical requirements on the company's evolving Apex Platform. Peter previously spent 18 years with eWEEK (formerly PC Week), the national news magazine of enterprise technology practice, where he reviewed software development tools and methods and wrote regular columns on emerging technologies and professional community issues.Before he began writing full-time in 1989, Peter spent eleven years in technical and management positions at Exxon and The Aerospace Corporation, including management of the latter company's first desktop computing planning team and applied research in applications of artificial intelligence techniques. He holds an engineering degree from MIT and an MBA from Pepperdine University, he has held teaching appointments in computer science, business analytics and information systems management at Pepperdine, UCLA, and Chapman College.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.