Denial of Responsibility (DoR) Attacks
Drew Danielson
andrew.danielson at CMU.EDU
Tue Jun 4 15:37:10 UTC 2002
I suppose then this web page models a type of "Assertion of Entitlement"
(AoE) attack?
http://www.microsoft.com/freedomtoinnovate/default.asp
Grant Barrett wrote:
>
> Coined for the computing world, but applicable in politics as well: Denial
> of Responsbility (DoR) attacks, patterned after Denial of Service (DoS)
> attacks.
>
> http://www.oreillynet.com/cs/weblog/view/wlg/1500
>
> "DoR attacks used to be of a simple, garden-variety type where a computer
> manufacturer obscures the fact it has shipped a system with bugs (sometimes
> known to the company in advance). More recent DoR attacks include the
> inclusion of "cool features" that benefit only a few curious experimenters
> but open the door to serious intrusions."
>
> --
>
> Apple Macintosh Technical Support in New York City
> gbarrett at worldnewyork.org
> http://www.worldnewyork.org/
> 646 296 2260
--
.............................................
. D r e w D a n i e l s o n .
. <andrew.danielson at cmu.edu> .
. Admin for Krogh, Gabriel, Fedder & Rajkumar .
. Carnegie Mellon University ECE Department .
. 5000 Forbes Avenue Pittsburgh, PA 15213 .
. +1 412 268-2188 Voice +1 412 268-3890 Fax .
. http://www.ece.cmu.edu/~dmunk .
.............................................
A fool with a sense of his foolishness is --
at least to that extent -- wise.
-- Dhammapada
More information about the Ads-l
mailing list