Re: [Asrg] Computer Security Communication Network

Adam Sobieski <> Mon, 17 December 2012 04:07 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 5389421F88D1 for <>; Sun, 16 Dec 2012 20:07:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.381
X-Spam-Status: No, score=-2.381 tagged_above=-999 required=5 tests=[AWL=0.217, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id cSha1mVk6Rk8 for <>; Sun, 16 Dec 2012 20:07:19 -0800 (PST)
Received: from ( []) by (Postfix) with ESMTP id 57AA621F88DD for <>; Sun, 16 Dec 2012 20:07:14 -0800 (PST)
Received: from SNT002-W37 ([]) by with Microsoft SMTPSVC(6.0.3790.4675); Sun, 16 Dec 2012 20:07:13 -0800
X-EIP: [7z60U1r6pUuv7YFMkOdX9kT39Te/sd0P]
X-Originating-Email: []
Message-ID: <SNT002-W3728935959EC88B4A4B612C5320@phx.gbl>
Content-Type: multipart/alternative; boundary="_f7aacd37-6691-4329-b42d-7c11081337b7_"
From: Adam Sobieski <>
To: Anti-Spam Research Group - IRTF <>
Date: Mon, 17 Dec 2012 04:07:13 +0000
Importance: Normal
In-Reply-To: <20121216181003.46545.qmail@joyce.lan>
References: <SNT002-W1162FDBE7C267DEF68DAD46C5330@phx.gbl>, <20121216181003.46545.qmail@joyce.lan>
MIME-Version: 1.0
X-OriginalArrivalTime: 17 Dec 2012 04:07:13.0698 (UTC) FILETIME=[FE8C7020:01CDDC0B]
Subject: Re: [Asrg] Computer Security Communication Network
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Anti-Spam Research Group - IRTF <>
List-Id: Anti-Spam Research Group - IRTF <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 17 Dec 2012 04:07:20 -0000

Internet Research Task Force,
Anti-Spam Research Group,
John Levine,

Distributed checksum clearinghouse heuristics resemble some P2P concepts.  Improving on DCC in distributed systems can be achieved simply with techniques, with more complex voting systems, and with logic-based techniques, such as evidence-based distributed computing and uses of machine-utilizable argumentation which include user and mechanical observations.  Logic programming and computer security, computer security policy, are interrelated, as you can see at the Singularity RDK which includes a Prolog implementation:

Here are some publications: A Comparative Study of Pub/Sub Methods in Structured P2P Networks by Matthias Bender, Sebastian Michel, Sebastian Parkitny, Gerhard Weikum ; Publish/Subscribe for RDF-based P2P Networks by Paul - Alexandru Chirita, Stratos Idreos, Manolis Koubarakis, and Wolfgang Nejdl ; Content-based Publish-Subscribe Over Structured P2P Networks by Peter Triantafillou and Ioannis Aekaterinidis.

In addition to the discussion topics of new computer security information resources, improving Usenet, improving NNTP is entirely possible.

Kind regards,

Adam Sobieski