Trustworthy Computing Needs
نویسنده
چکیده
Within the US alone, there are approximately 28,600 networked Federal Deposit Insurance Corporation (FDIC) institutions, 2 million miles of oil/gas pipelines, 2,800 power plants with 300,000 production sites, 104 nuclear power plants, 80,000 dams, 60,000 chemical plants, 87,000 food processing plants, and 1,600 water treatment plants. And, this is just part of our national infrastructure. Add to this telecommunications and other “everyday” utilities and the scope is enormous.
منابع مشابه
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs to withstand malicious attack. The process encompasses the addition of a series of securityfocused activities and deliverables to each of the phases of Microsoft's software development process. These activities and del...
متن کاملNational Science Foundation ’ s Workshop on Trustworthy Computing
2 Keynote Talks 2 2.1 Keynote 1. Trustworthy Computing in the Clouds . . . . . . . . . . . . . . . . . . 2 2.2 Keynote 2. Architectures for Practical Client-Side Security . . . . . . . . . . . . . 2 2.3 Keynote 3. Daniel Geer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.4 Keynote 4. Whither Trustworthy Computing? A Short Summary of a Long History and Big Future Themes . ....
متن کاملTowards an Engineering Approach to Component Adaptation
Component adaptation needs to be taken into account when developing trustworthy systems, where the properties of component assemblies have to be reliably obtained from the properties of its constituent components. Thus, a more systematic approach to component adaptation is required when building trustworthy systems. In this paper, we illustrate how (design and architectural) patterns can be use...
متن کاملCOMPSAC Panel Session on Trustworthy Computing
We, as individuals, as well as governments, corporations, and institutions, form a networked society and we are increasingly dependent on that network. The very fabric of our everyday life and business utilizes this networked connectivity, particularly critical infrastructures such as the electric power grid, oil and gas pipeline and distribution systems, telecommunications, transportation, and...
متن کاملTrustworthy Service Caching: Cooperative Search in P2P Information Systems
We are developing an approach for P2P information systems, where the peers are modeled as autonomous agents. Agents provide services or give referrals to one another to help find trustworthy services. We consider the important case of information services that can be cached. Agents request information services through highlevel queries, not by describing specific objects as in caching in tradit...
متن کامل