Arms Control in Cyberspace - Architecture for a Trust-Based Implementation Framework Based on Conventional Arms Control Methods

被引:0
|
作者
Maybaum, Markus [1 ,2 ]
Toelle, Jens [1 ]
机构
[1] Fraunhofer FKIE, Bonn, Germany
[2] NATO CCD COE, Tallinn, Estonia
来源
2017 INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.): PROCEEDINGS : 7-8 NOVEMBER 2017, WASHINGTON, DC, USA | 2016年
关键词
arms control; cyberspace; trusted computing; advanced trusted environment;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper explores verification mechanisms, as well as confidence and security building measures, within the scope of existing conventional and strategic arms control regimes. In particular, it analyses the concepts of the Conventional Forces in Europe Treaty and the Vienna Document as an implementation regime for confidence and security building measures as well as the Open Skies Treaty, representing three major conventional arms control regimes. As an example for strategic arms control, we analyse the Chemical Weapons Convention. The objective of this paper is to identify those means and methods from these successful frameworks that can be adapted and potentially incorporated into a cyber-domain arms control regime. Based on this discussion, the authors suggest a general technical architecture for a trust-based future framework for arms control for cyberspace.
引用
收藏
页码:159 / 173
页数:15
相关论文
共 11 条
  • [1] Civil war and state support for conventional arms control
    Risse, Tobias
    CONFLICT MANAGEMENT AND PEACE SCIENCE, 2025, 42 (01) : 11 - 31
  • [2] A Trust-based Usage Control Scheme for Resource Sharing
    Lu, Chen
    Zhang Li-Qiang
    Qing, Zhou
    Yun, Chen
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 550 - 556
  • [3] AI and nuclear decisions: Toward an arms control framework
    Saadia, Haleema
    Israiilov, Tynchtykbek
    Mikhalevich, Ekaterina
    Sandbrink, Jonas
    CONTEMPORARY SECURITY POLICY, 2025,
  • [4] Trust but verify: Satellite reconnaissance, secrecy and arms control during the Cold War
    Bateman, Aaron
    JOURNAL OF STRATEGIC STUDIES, 2023, 46 (05) : 1037 - 1061
  • [5] HIGH-PRECISION LONG-RANGE CONVENTIONAL WEAPONS AND NUCLEAR ARMS CONTROL
    Anichkina, Tatiana B.
    MIROVAYA EKONOMIKA I MEZHDUNARODNYE OTNOSHENIYA, 2019, 63 (09): : 14 - 21
  • [6] Deflective Cooperation: Social Pressure and Forum Management in Cold War Conventional Arms Control
    Mantilla, Giovanni
    INTERNATIONAL ORGANIZATION, 2023, 77 (03) : 564 - 598
  • [7] A STONE GUEST? THE FORWARD-BASED SYSTEMS AND THE ARMS CONTROL NEGOTIATIONS FROM NIXON TO REAGAN
    Leonardi, Alessandro
    ACTA HISTRIAE, 2018, 26 (03): : 807 - 828
  • [8] A trust-role based context aware access control model
    Chen Lu
    Zhou Qing
    Huang Gao-feng
    Zhang Li-qiang
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 371 - 376
  • [9] SECURE CONTROL OF MOBILE TERMINAL'S SENSITIVE INFORMATION BASED ON THE DYNAMIC TRUST MEASUREMENT
    Fei, Jiaxuan
    Zhang, Tao
    Lin, Weimin
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 445 - 449
  • [10] An Active Defence Architecture for Industrial Control System based on Trusted Computing 3.0
    Yang Weiyong
    Tao Hongzhu
    Liu Wei
    Wang Jingpei
    Wei Xingshen
    Wang Haiqing
    Huang Hao
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 2080 - 2085