[p2prg] Computer Security Information Resources

Adam Sobieski <adamsobieski@hotmail.com> Mon, 17 December 2012 04:58 UTC

Return-Path: <adamsobieski@hotmail.com>
X-Original-To: p2prg@ietfa.amsl.com
Delivered-To: p2prg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84FFF21F8428 for <p2prg@ietfa.amsl.com>; Sun, 16 Dec 2012 20:58:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.412
X-Spam-Level:
X-Spam-Status: No, score=-2.412 tagged_above=-999 required=5 tests=[AWL=0.186, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CY9TzIPU4s2W for <p2prg@ietfa.amsl.com>; Sun, 16 Dec 2012 20:58:33 -0800 (PST)
Received: from snt0-omc4-s46.snt0.hotmail.com (snt0-omc4-s46.snt0.hotmail.com [65.54.51.97]) by ietfa.amsl.com (Postfix) with ESMTP id D154421F841F for <p2prg@irtf.org>; Sun, 16 Dec 2012 20:58:32 -0800 (PST)
Received: from SNT002-W11 ([65.55.90.199]) by snt0-omc4-s46.snt0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675); Sun, 16 Dec 2012 20:58:32 -0800
X-EIP: [MqAsUa0DoA7hOVcMC68ucuYqJ3WM1mRL]
X-Originating-Email: [adamsobieski@hotmail.com]
Message-ID: <SNT002-W11F426CE9D3DA6557ED282C5320@phx.gbl>
Content-Type: multipart/alternative; boundary="_470c77cc-6632-420c-951f-45f778b56671_"
From: Adam Sobieski <adamsobieski@hotmail.com>
To: "p2prg@irtf.org" <p2prg@irtf.org>
Date: Mon, 17 Dec 2012 04:58:32 +0000
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 17 Dec 2012 04:58:32.0430 (UTC) FILETIME=[299DA8E0:01CDDC13]
Subject: [p2prg] Computer Security Information Resources
X-BeenThere: p2prg@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Peer-to-Peer Research Group <p2prg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/p2prg>, <mailto:p2prg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/p2prg>
List-Post: <mailto:p2prg@irtf.org>
List-Help: <mailto:p2prg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/p2prg>, <mailto:p2prg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Dec 2012 04:58:33 -0000

Internet Research Task Force,
Peer-to-peer Research Group,
 
Greetings.  In addition to distributed, decentralized, peer-to-peer forum technologies, we can envision, research and develop computer systems specifically for computer software developers and computer security professionals; distributed, decentralized, peer-to-peer computer security information resources; computer systems for the dissemination of instantaneous computer security information between computer scientists.
 
Such systems can, in numerous ways, enhance the security of computers, computer systems, and computer networks by enhancing the flow of information between and the well-informedness of each interested computer scientist around the world.
 
Such systems can be interoperable with the concurrent versioning systems of open source software projects so that information about security-related software updates can be instantaneously routed to interested computer scientists.  Computer scientists, computer security professionals, can post messages to such systems with message metadata expressiveness including with regard to specific computers', computer systems', or computer networks' configurations.
 
Some papers about peer-to-peer data routing include: A Comparative Study of Pub/Sub Methods in Structured P2P Networks by Matthias Bender, Sebastian Michel, Sebastian Parkitny, Gerhard Weikum ; Publish/Subscribe for RDF-based P2P Networks by Paul - Alexandru Chirita, Stratos Idreos, Manolis Koubarakis, and Wolfgang Nejdl ; Content-based Publish-Subscribe Over Structured P2P Networks by Peter Triantafillou and Ioannis Aekaterinidis.
 
The envisioned computer security information resources can be researched, developed, and constructed for the dissemination of computer security information, enhancing the flow of information between and the instantaneous well-informedness of computer software developers and computer security professionals, personnel around the world responsible for versioning each software and securing each computer, computer system, and computer network.



Kind regards,

Adam Sobieski