Abuse Melding

Je hebt een klacht over de onderstaande posting:

08-09-2007, 14:56 door Jan-Hein

Even in mijn poging tot engels, omdat ik het ook rechtstreeks aan Joanna hebt gericht: I see a connection between AV and signing that supports Joanna's criticism regarding resource allocation processes, but that also shows limits to signing as a defense against malware threats. I use the following model of the process that we are trying to manage: 1. Source (S) takes responsibility for generation of data (D). 2. Consumer (C) receives D 3. C processes D 4. C gets hurt. I assume that we want to manage the risk of 4. The first thing we do is closing the loop: 5. C notices it has been hurt 6. we identify S 7. we hunt S 8. we catch S 9. S is found guilty in a fair trial 10. we punish S 11. S changes its behavior 12. goto 1 with a reduced risk in 4. The management of this process is being supplied by a global cooperation (at least interaction) of all parties involved: we. I prefer to call it the Network Of Trust (NOT). At the moment NOT is nearly invisible, and its maturing ...

Beschrijf je klacht (Optioneel):

captcha