skip to main content
opinion
Free Access

The big picture

Published:26 October 2018Publication History
Skip Abstract Section

Abstract

A systems-oriented view of trustworthiness.

References

  1. Abelson, H. et al. The risks of key recovery, key escrow, and trusted third-party encryption. World-Wide Web Journal 2, 3 (Summer 1997), 241--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Abelson, H. et al. Keys under doormats: Mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity 1, 1 (Nov. 2015), Oxford University Press; http://www.cybersecurity.oxfordjournals.org/content/1/1/69Google ScholarGoogle Scholar
  3. Bellovin, S.M. The key to the key. IEEE Security and Privacy 13, 6 (Nov.-Dec. 2015), 96--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Clark, D.D. et al. Computers at Risk: Safe Computing in the Information Age. National Research Council, National Academies Press, Washington, D.C., 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dam, K.W. and Lin, H.S., Eds. Cryptography's role in securing the information society. National Research Council, National Academies Press, Washington, D.C., 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Goodman, S.E. and Lin, H.S., Eds. Toward a safer and more secure cyberspace. National Research Council, National Academies Press, Washington, D.C., 2007.Google ScholarGoogle Scholar
  7. Landau, S. et al. Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy. (ACM-sponsored study), 1994.Google ScholarGoogle Scholar
  8. Neumann P.G. Computer-Related Risks. Addison-Wesley and ACM Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Neumann, P.G. Principled assuredly trustworthy composable architectures, final report. SRI International, 2004; http://www.csl.sri.com/neumann/chats4.pdfGoogle ScholarGoogle Scholar
  10. Neumann, P.G. Fundamental trustworthiness principles in CHERI. In New Solutions for Cybersecurity, MIT Press, Cambridge, MA, 2018.Google ScholarGoogle Scholar
  11. Schneider, F.B. and Blumenthal, M., Eds. Trust in Cyberspace. National Research Council, National Academies Press, 2101 Constitution Ave., Washington, D.C., 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Shrobe, H. et al., Eds. Solutions for Cybersecurity. MIT Press, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Van Bulck et al. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. USENIX Security (Aug. 14--17, 2013); http://foreshadowattack.eu/Google ScholarGoogle Scholar
  14. Watson, R.N.M. et al. Capability hardware enhanced RISC instructions (CHERI): Notes on the Meltdown and Spectre attacks. University of Cambridge Technical Report 916, 2017; http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-916.pdfGoogle ScholarGoogle Scholar
  15. Weisse, O. et al. Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution (Aug. 14, 2018); http://foreshadowattack.eu/.Google ScholarGoogle Scholar

Index Terms

  1. The big picture

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 61, Issue 11
      November 2018
      156 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3289258
      Issue’s Table of Contents

      Copyright © 2018 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 October 2018

      Check for updates

      Qualifiers

      • opinion
      • Popular
      • Un-reviewed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format