ABSTRACT
Characteristic problem areas experienced in the past are considered here, as well as some of the challenges that must be confronted in trying to achieve greater trustworthiness in computer systems and networks and in the overall environments in which they must operate. Some system development recommendations for the future are also discussed.
- R.P. Abbott et al. Security analysis and enhancements of computer operating systems. Technical report, National Bureau of Standards, 1974. Order No. S-413558-74.Google Scholar
- B. Adida and C.A. Neff. Ballot casting assurance. In Workshop on Electronic Voting Technology Workshop, Vancouver, BC, Canada, August 2006. USENIX. Google ScholarDigital Library
- Steven M. Bellovin. Virtual machines, virtual security? Communications of the ACM, 49(10), October 2006. Inside Risks column. Google ScholarDigital Library
- J. Benaloh. Simple verifiable elections. In Workshop on Electronic Voting Technology Workshop, Vancouver, BC, Canada, August 2006. USENIX. Google ScholarDigital Library
- F.J. Corbató. On building systems that will fail (1990 Turing Award Lecture, with a following interview by Karen Frenkel). Communications of the ACM, 34(9):72--90, September 1991. Google ScholarDigital Library
- F.J. Corbató , J. Saltzer, and C.T. Clingen. Multics: The first seven years. In Proceedings of the Spring Joint Computer Conference, volume 40, Montvale, New Jersey, 1972. AFIPS Press.Google Scholar
- E.W. Dijkstra. The structure of the THE multiprogramming system. Communications of the ACM, 11(5), May 1968. Google ScholarDigital Library
- R.J. Feiertag and P.G. Neumann. The foundations of a Provably Secure Operating System (PSOS). In Proceedings of the National Computer Conference, pages 329--334. AFIPS Press, 1979. http://www.csl.sri.com/neumann/psos.pdfhttp://www.csl.sri.com/neumann/psos.pdf.Google ScholarCross Ref
- P.A. Karger. Limiting the damage potential of discretionary Trojan horses. In Proceedings of the 1987 Symposium on Security and Privacy, pages 32--37, Oakland, California, April 1987. IEEE Computer Society.Google ScholarCross Ref
- C.E. Landwehr, A.R. Bull, J.P. McDermott, and W.S. Choi. A taxonomy of computer program security flaws, with examples. Technical report, Center for Secure Information Technology, Information Technology Division, Naval Research Laboratory, Washington, D.C., November 1993.Google Scholar
- R. Mercuri. Electronic Vote Tabulation Checks and Balances. PhD thesis, Department of Computer Science, University of Pennsylvania, 2001. http://www.notablesoftware.com/evote.htmlhttp://www.notablesoftware.com/evote.html. Google ScholarDigital Library
- C.A. Neff. A verifiable secret shuffle and its application to e-voting. In Proceedings of the ACM Conference on Computer and Communications Security, pages 116--125, Philadelphia, Pennsylvania, November 2001. Google ScholarDigital Library
- P.G. Neumann. Illustrative risks to the public in the use of computer systems and related technology, index to RISKS cases. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California. Updated regularly at http://www.csl.sri.com/neumann/illustrative.html; also in .ps and .pdf form for printing in a denser format. Google ScholarDigital Library
- P.G. Neumann. The role of motherhood in the pop art of system programming. In Proceedings of the ACM Second Symposium on Operating Systems Principles, Princeton, New Jersey, pages 13--18. ACM, October 1969. http://www.multicians.org/pgn-motherhood.html. Google ScholarDigital Library
- P.G. Neumann. Computer-Related Risks. ACM Press, New York, and Addison-Wesley, Reading, Massachusetts, 1995. Google ScholarDigital Library
- P.G. Neumann. Principled assuredly trustworthy composable architectures. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, December 2004. http://www.csl.sri.com/neumann/chats4.html, .pdf, and .ps.Google Scholar
- P.G. Neumann, R.S. Boyer, R.J. Feiertag, K.N. Levitt, and L. Robinson. A Provably Secure Operating System: The system, its applications, and proofs. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, May 1980. 2nd edition, Report CSL-116.Google Scholar
- P.G. Neumann and R.J. Feiertag. PSOS revisited. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), Classic Papers section, pages 208--216, Las Vegas, Nevada, December 2003. IEEE Computer Society. http://www.acsac.org/ and http://www.csl.sri.com/neumann/psos03.pdf. Google ScholarDigital Library
- P.G. Neumann and D.B. Parker. A summary of computer misuse techniques. In Proceedings of the Twelfth National Computer Security Conference, pages 396--407, Baltimore, Maryland, 10--13 October 1989. NIST/NCSC.Google Scholar
- D.L. Parnas. On the criteria to be used in decomposing systems into modules. Communications of the ACM, 15(12), December 1972. Google ScholarDigital Library
- N.E. Proctor and P.G. Neumann. Architectural implications of covert channels. In Proceedings of the Fifteenth National Computer Security Conference, pages 28--43, Baltimore, Maryland, 13--16 October 1992. http://www.csl.sri.com/neumann/ncs92.htmlhttp://www.csl.sri.com/neumann/ncs92.html).Google Scholar
- L. Robinson and K.N. Levitt. Proof techniques for hierarchically structured programs. Communications of the ACM, 20(4):271--283, April 1977. Google ScholarDigital Library
- J.A. Rochlis and M.W. Eichin. With microscope and tweezers: The Worm from MIT's perspective. Communications of the ACM, 32(6):689--698, June 1989. Google ScholarDigital Library
- E. Rosen. Vulnerabilities of network control protocols. ACM SIGSOFT Software Engineering Notes, 6(1):6--8, January 1981. Google ScholarDigital Library
- A. Rubin. Brave New Ballot. Random House, 2006.Google Scholar
- J.M. Rushby. The design and verification of secure systems. In Proceedings of the Eighth ACM Symposium on Operating System Principles, pages 12--21, Asilomar, California, December 1981. (ACM Operating Systems Review, 15(5)). Google ScholarDigital Library
- J.M. Rushby and B. Randell. A distributed secure system (extended abstract). In Proceedings of the 1983 IEEE Symposium on Security and Privacy, pages 127--135, Oakland, California, April 1983. IEEE Computer Society. Google ScholarDigital Library
- J.H. Saltzer and M.D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, September 1975.Google ScholarCross Ref
- E.H. Spafford. The Internet Worm: crisis and aftermath. Communications of the ACM, 32(6):678--687, June 1989. Google ScholarDigital Library
- K.L. Thompson. Reflections on trusting trust. Communications of the ACM, 27(8):761--763, August 1984. Google ScholarDigital Library
- K. Tsikpenyuk, B. Chess, and G. McGraw. Seven pernicious kingdoms: A taxonomy of software security errors. IEEE Security and Privacy, 3(6), November-December 2005. Google ScholarDigital Library
Index Terms
- System and network trustworthiness in perspective
Recommendations
Perceived Trustworthiness Within the Organization: The Moderating Impact of Communication Frequency on Trustor and Trustee Effects
This paper investigates the antecedents of intraorganizational trust and, more specifically, how the frequency of communication between trustor and trustee moderates the impact of these factors on perceived trustworthiness. Data on 157 dyadic ...
Reflections on the dimensions of trust and trustworthiness among online consumers
Trust is emerging as a potentially central aspect leading to IT acceptance. It is especially needed in the case of gaining and later retaining consumers of online vendors. This has been shown by previous research using single dimensional constructs. But ...
Cyber security quantification model
SIN '10: Proceedings of the 3rd international conference on Security of information and networksSecurity of information systems is a major concern today because the existing threats are getting new dimensions. Information Security (IS) is to protect our important information assets from accidental or deliberate damages. Cyber Security (CS) is a ...
Comments