skip to main content
10.1145/1180405.1180406acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

System and network trustworthiness in perspective

Published:30 October 2006Publication History

ABSTRACT

Characteristic problem areas experienced in the past are considered here, as well as some of the challenges that must be confronted in trying to achieve greater trustworthiness in computer systems and networks and in the overall environments in which they must operate. Some system development recommendations for the future are also discussed.

References

  1. R.P. Abbott et al. Security analysis and enhancements of computer operating systems. Technical report, National Bureau of Standards, 1974. Order No. S-413558-74.Google ScholarGoogle Scholar
  2. B. Adida and C.A. Neff. Ballot casting assurance. In Workshop on Electronic Voting Technology Workshop, Vancouver, BC, Canada, August 2006. USENIX. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Steven M. Bellovin. Virtual machines, virtual security? Communications of the ACM, 49(10), October 2006. Inside Risks column. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Benaloh. Simple verifiable elections. In Workshop on Electronic Voting Technology Workshop, Vancouver, BC, Canada, August 2006. USENIX. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. F.J. Corbató. On building systems that will fail (1990 Turing Award Lecture, with a following interview by Karen Frenkel). Communications of the ACM, 34(9):72--90, September 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F.J. Corbató , J. Saltzer, and C.T. Clingen. Multics: The first seven years. In Proceedings of the Spring Joint Computer Conference, volume 40, Montvale, New Jersey, 1972. AFIPS Press.Google ScholarGoogle Scholar
  7. E.W. Dijkstra. The structure of the THE multiprogramming system. Communications of the ACM, 11(5), May 1968. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R.J. Feiertag and P.G. Neumann. The foundations of a Provably Secure Operating System (PSOS). In Proceedings of the National Computer Conference, pages 329--334. AFIPS Press, 1979. http://www.csl.sri.com/neumann/psos.pdfhttp://www.csl.sri.com/neumann/psos.pdf.Google ScholarGoogle ScholarCross RefCross Ref
  9. P.A. Karger. Limiting the damage potential of discretionary Trojan horses. In Proceedings of the 1987 Symposium on Security and Privacy, pages 32--37, Oakland, California, April 1987. IEEE Computer Society.Google ScholarGoogle ScholarCross RefCross Ref
  10. C.E. Landwehr, A.R. Bull, J.P. McDermott, and W.S. Choi. A taxonomy of computer program security flaws, with examples. Technical report, Center for Secure Information Technology, Information Technology Division, Naval Research Laboratory, Washington, D.C., November 1993.Google ScholarGoogle Scholar
  11. R. Mercuri. Electronic Vote Tabulation Checks and Balances. PhD thesis, Department of Computer Science, University of Pennsylvania, 2001. http://www.notablesoftware.com/evote.htmlhttp://www.notablesoftware.com/evote.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C.A. Neff. A verifiable secret shuffle and its application to e-voting. In Proceedings of the ACM Conference on Computer and Communications Security, pages 116--125, Philadelphia, Pennsylvania, November 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P.G. Neumann. Illustrative risks to the public in the use of computer systems and related technology, index to RISKS cases. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California. Updated regularly at http://www.csl.sri.com/neumann/illustrative.html; also in .ps and .pdf form for printing in a denser format. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P.G. Neumann. The role of motherhood in the pop art of system programming. In Proceedings of the ACM Second Symposium on Operating Systems Principles, Princeton, New Jersey, pages 13--18. ACM, October 1969. http://www.multicians.org/pgn-motherhood.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P.G. Neumann. Computer-Related Risks. ACM Press, New York, and Addison-Wesley, Reading, Massachusetts, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P.G. Neumann. Principled assuredly trustworthy composable architectures. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, December 2004. http://www.csl.sri.com/neumann/chats4.html, .pdf, and .ps.Google ScholarGoogle Scholar
  17. P.G. Neumann, R.S. Boyer, R.J. Feiertag, K.N. Levitt, and L. Robinson. A Provably Secure Operating System: The system, its applications, and proofs. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, May 1980. 2nd edition, Report CSL-116.Google ScholarGoogle Scholar
  18. P.G. Neumann and R.J. Feiertag. PSOS revisited. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), Classic Papers section, pages 208--216, Las Vegas, Nevada, December 2003. IEEE Computer Society. http://www.acsac.org/ and http://www.csl.sri.com/neumann/psos03.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P.G. Neumann and D.B. Parker. A summary of computer misuse techniques. In Proceedings of the Twelfth National Computer Security Conference, pages 396--407, Baltimore, Maryland, 10--13 October 1989. NIST/NCSC.Google ScholarGoogle Scholar
  20. D.L. Parnas. On the criteria to be used in decomposing systems into modules. Communications of the ACM, 15(12), December 1972. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. N.E. Proctor and P.G. Neumann. Architectural implications of covert channels. In Proceedings of the Fifteenth National Computer Security Conference, pages 28--43, Baltimore, Maryland, 13--16 October 1992. http://www.csl.sri.com/neumann/ncs92.htmlhttp://www.csl.sri.com/neumann/ncs92.html).Google ScholarGoogle Scholar
  22. L. Robinson and K.N. Levitt. Proof techniques for hierarchically structured programs. Communications of the ACM, 20(4):271--283, April 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J.A. Rochlis and M.W. Eichin. With microscope and tweezers: The Worm from MIT's perspective. Communications of the ACM, 32(6):689--698, June 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. E. Rosen. Vulnerabilities of network control protocols. ACM SIGSOFT Software Engineering Notes, 6(1):6--8, January 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Rubin. Brave New Ballot. Random House, 2006.Google ScholarGoogle Scholar
  26. J.M. Rushby. The design and verification of secure systems. In Proceedings of the Eighth ACM Symposium on Operating System Principles, pages 12--21, Asilomar, California, December 1981. (ACM Operating Systems Review, 15(5)). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J.M. Rushby and B. Randell. A distributed secure system (extended abstract). In Proceedings of the 1983 IEEE Symposium on Security and Privacy, pages 127--135, Oakland, California, April 1983. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J.H. Saltzer and M.D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, September 1975.Google ScholarGoogle ScholarCross RefCross Ref
  29. E.H. Spafford. The Internet Worm: crisis and aftermath. Communications of the ACM, 32(6):678--687, June 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. K.L. Thompson. Reflections on trusting trust. Communications of the ACM, 27(8):761--763, August 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. K. Tsikpenyuk, B. Chess, and G. McGraw. Seven pernicious kingdoms: A taxonomy of software security errors. IEEE Security and Privacy, 3(6), November-December 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. System and network trustworthiness in perspective

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
      October 2006
      434 pages
      ISBN:1595935185
      DOI:10.1145/1180405

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 October 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader