{"id":187185,"date":"2011-09-27T00:00:00","date_gmt":"2012-01-17T10:26:52","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/msr-research-item\/retroactive-security\/"},"modified":"2016-08-23T15:31:19","modified_gmt":"2016-08-23T22:31:19","slug":"retroactive-security","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/retroactive-security\/","title":{"rendered":"Retroactive Security"},"content":{"rendered":"
\n

Classic security uses access control, and, essentially, that does not work. Current systems are designed to say \u201cno\u201d and otherwise limit access, while another reason is code bugs. Real-world security currently is retroactive, an example being the financial system, in which mistakes or breaks can be undone after they occur. Typical access controls consist of both physical and principal boundaries, isolation of an item or information, control of access into this isolation, and policies stating who can have access.<\/p>\n<\/div>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Classic security uses access control, and, essentially, that does not work. Current systems are designed to say \u201cno\u201d and otherwise limit access, while another reason is code bugs. Real-world security currently is retroactive, an example being the financial system, in which mistakes or breaks can be undone after they occur. Typical access controls consist of […]<\/p>\n","protected":false},"featured_media":196569,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"footnotes":""},"research-area":[13546,13555,13558,13547],"msr-video-type":[],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-187185","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-computational-sciences-mathematics","msr-research-area-search-information-retrieval","msr-research-area-security-privacy-cryptography","msr-research-area-systems-and-networking","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/pC7GNgYaopE","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/187185"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/187185\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/196569"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=187185"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=187185"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=187185"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=187185"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=187185"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=187185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}