Toward scalable trustworthy computing using the human-physiology-immunity metaphor

Lee Hively, Frederick Sheldon, Anna Cinzia Squicciarini

Research output: Contribution to journalArticlepeer-review

1 Scopus citations


The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constraints, inherent flaws in "Maginot Line" defenses, and the growing number and sophistication of cyberattacks. This article defines the high-priority problems and examines the potential solution space. In that space, achieving scalable trustworthy computing and communications is possible through real-time knowledge-based decisions about cyber trust. This vision is based on the human-physiology-immunity metaphor and the human brain's ability to extract knowledge from data and information. The article outlines future steps toward scalable trustworthy systems requiring a long-term commitment to solve the well-known challenges.

Original languageEnglish (US)
Article number5560629
Pages (from-to)14-23
Number of pages10
JournalIEEE Security and Privacy
Issue number4
StatePublished - Jul 2011

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law


Dive into the research topics of 'Toward scalable trustworthy computing using the human-physiology-immunity metaphor'. Together they form a unique fingerprint.

Cite this