Security Engineering: A Guide to Building Dependable Distributed Systems
نویسندگان
چکیده
Computers are not (yet?) capable of being reasonable any more than is a Second Lieutenant. Against stupidity, the Gods themselves contend in vain. Banking systems include the back-end bookkeeping systems that record customers' account details and transaction processing systems such as cash machine networks and high-value interbank money transfer systems that feed them with data. They are important for a number of reasons. First, bookkeeping was for many years the main business of the computer industry, and banking was its most intensive area of application. Personal applications such as Netscape and Powerpoint might now run on more machines, but accounting is still the critical application for the average business. So the protection of bookkeeping systems is of great practical importance. It also gives us a well-understood model of protection in which confidentiality plays almost no role, but where the integrity of records (and their immutability once made) is of paramount importance. Second, transaction processing systems—whether for small debits such as $50 cash machine withdrawals or multimillion-dollar wire transfers—were the applications that launched commercial cryptography. Banking applications drove the development not just of encryption algorithms and protocols, but also of the supporting technologies, such as tamper-resistant cryptographic processors. These processors provide an important and interesting example of a trusted computing base that is quite different from
منابع مشابه
Security engineering - a guide to building dependable distributed systems
Security Engineering: A Guide to Building Dependable Distributed Systems Ross Anderson Wiley Computer Publishing This is an upper-level undergraduate, first-year graduate course on network and computer security. This course introduces the principles and practices of cryptography and network security. The first half of the class content covers basic cryptographic methods, key distribution, and p...
متن کاملSecurity Engineering: A Guide to Building Dependable Distributed Systems
In Germany and Turkey they viewed scenes that were particularly distressing. On the runway stood a German (or Turkish) quick-reaction alert airplane loaded with nuclear weapons and with a foreign pilot in the cockpit. The airplane was ready to take off at the earliest warning, and the nuclear weapons were fully operational. The only evidence of U.S. control was a lonely 18-year-old sentry armed...
متن کاملSecurity Engineering: A Guide to Building Dependable Distributed Systems
A seal is only as good as the man in whose briefcase it's carried. —KAREN SPÄRCK JONES 12.1 Introduction Many computer systems rely to some extent on secure printing, packaging, and seals to guarantee important aspects of their protection. • Many software products get some protection against forgery, using tricks such as holographic stickers that are supposed to tear when removed from the packa...
متن کاملAn ANSA Analysis of Open Dependable Distributed Computing
System dependability is increasing in importance in the market place. A recent report predicts that the market for fault-tolerant systems will double in the next three years. Within the context of large open distributed systems, dependability will be particularly important: the more components a system has the greater the probability that one of those components will be faulty. Over the next tw...
متن کامل