In Computers We Trust

نویسنده

  • Kenneth P. Birman
چکیده

Computing systems are finding their way into increasingly sensitive roles and settings: medical systems that manage patient care records and that link providers with hospitals and pharmacies, computer-assisted air traffic control systems, systems that administer energy delivery and electric power grids, and systems for chemical refineries and railroads. In these and other uses, we need computers we can trust.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Theory of Trust in Networks of Humans and Computers (CMU-CyLab-11-016)

We argue that a general theory of trust in networks of humans and computers must be build on both a theory of behavioral trust and a theory of computational trust. This argument is motivated by increased participation of people in social networking, crowdsourcing, human computation, and socio-economic protocols, e.g., protocols modeled by trust and gift-exchange games [3, 10, 11], norms-establi...

متن کامل

A Nonmonotone trust region method with adaptive radius for unconstrained optimization problems

In this paper, we incorporate a nonmonotone technique with the new proposed adaptive trust region radius (Shi and Guo, 2008) [4] in order to propose a new nonmonotone trust region method with an adaptive radius for unconstrained optimization. Both the nonmonotone techniques and adaptive trust region radius strategies can improve the trust region methods in the sense of global convergence. The g...

متن کامل

Trusted Mobile Computing

Mobility leads to unplanned interactions between computer systems as people use devices to access services in varied environments. Before two systems agree to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper we introduce trust overlays, a systematic approach to building such trust. Our solution exploits the increasing availabilit...

متن کامل

On the Characterisation of a Trusting Agent { Aspects of a Formal Approach

We characterise aspects of the reasoning of an agent who trusts the reliability of the information communicated to him by some other agent. Tools drawn from applied modal logic are used to formulate the char-acterisation. Based on our analysis of trust, we ooer a deenition of a notion of deception. We indicate that, in our account, the trust relation is not transitive, but we also show how to r...

متن کامل

مؤلفه‌های اعتماد در رابطه‌ی پزشک و بیمار

Trust is an important factor in the relationship between physician and patient. Trust between physician and patient is an important factor in improving patient and physician satisfaction, but it will not materialize unless we define trust and its criteria. Since trust fulfillment is dependent on its criteria, in this study we tried to define these criteria. First, we explicated the meaning and ...

متن کامل

Inference attacks against trust-based onion routing: Trust degree to the rescue

Trust-based onion routing enhances anonymity protection by means of constructing onion circuits using trust-based routers. However, attackers who have the knowledge of a priori trust distributions are still capable of largely reducing the anonymity protected by trustbased circuits. The root cause is that these attackers have a high probability to guess the users who initiate trust-based circuit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Distributed Systems Online

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2005