Trustworthy Computing Needs

نویسنده

  • Ann Miller
چکیده

Within the US alone, there are approximately 28,600 networked Federal Deposit Insurance Corporation (FDIC) institutions, 2 million miles of oil/gas pipelines, 2,800 power plants with 300,000 production sites, 104 nuclear power plants, 80,000 dams, 60,000 chemical plants, 87,000 food processing plants, and 1,600 water treatment plants. And, this is just part of our national infrastructure. Add to this telecommunications and other “everyday” utilities and the scope is enormous.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Trustworthy Computing Security Development Lifecycle

This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs to withstand malicious attack. The process encompasses the addition of a series of securityfocused activities and deliverables to each of the phases of Microsoft's software development process. These activities and del...

متن کامل

National Science Foundation ’ s Workshop on Trustworthy Computing

2 Keynote Talks 2 2.1 Keynote 1. Trustworthy Computing in the Clouds . . . . . . . . . . . . . . . . . . 2 2.2 Keynote 2. Architectures for Practical Client-Side Security . . . . . . . . . . . . . 2 2.3 Keynote 3. Daniel Geer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.4 Keynote 4. Whither Trustworthy Computing? A Short Summary of a Long History and Big Future Themes . ....

متن کامل

Towards an Engineering Approach to Component Adaptation

Component adaptation needs to be taken into account when developing trustworthy systems, where the properties of component assemblies have to be reliably obtained from the properties of its constituent components. Thus, a more systematic approach to component adaptation is required when building trustworthy systems. In this paper, we illustrate how (design and architectural) patterns can be use...

متن کامل

COMPSAC Panel Session on Trustworthy Computing

We, as individuals, as well as governments, corporations, and institutions, form a networked society and we are increasingly dependent on that network. The very fabric of our everyday life and business utilizes this networked connectivity, particularly critical infrastructures such as the electric power grid, oil and gas pipeline and distribution systems, telecommunications, transportation, and...

متن کامل

Trustworthy Service Caching: Cooperative Search in P2P Information Systems

We are developing an approach for P2P information systems, where the peers are modeled as autonomous agents. Agents provide services or give referrals to one another to help find trustworthy services. We consider the important case of information services that can be cached. Agents request information services through highlevel queries, not by describing specific objects as in caching in tradit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006