Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Trust extension for commodity computers

Trust extension for commodity computers contributed articles Doi:10.1145/ 2184319.2184339 A user ™s trust in a single device can be extended to many other devices. By BRyAn PARno Trust extension for Commodity Computers as soCIety rUshes to digitize sensitive information and services, users and developers must adopt adequate security protections. However, such protections often conflict with the benefits expected from commodity computers. Consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low cost, but attempts to construct secure systems from the ground up are expensive, time-consuming, and unable to keep up with the changing marketplace.2,8,11,12 For example, the VAX VMM security kernel was developed over nine years (1981 “1990), but the kernel was never deployed. This failure was due, in part, to the absence of support for Ethernet, a feature considered crucial by the time the kernel was completed but not anticipated when originally designed.11 CoMM uniCATio ns o f The AC M | j u ne 201 2 | vo l . 5 5 | no. 6 Rather than build secure systems from scratch, the tension between security and features can be resolved by extending the trust users have in one device to enable http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Communications of the ACM Association for Computing Machinery

Trust extension for commodity computers

Communications of the ACM , Volume 55 (6) – Jun 1, 2012

Loading next page...
 
/lp/association-for-computing-machinery/trust-extension-for-commodity-computers-P0L8ElAHLD

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 2012 by ACM Inc.
ISSN
0001-0782
DOI
10.1145/2184319.2184339
Publisher site
See Article on Publisher Site

Abstract

contributed articles Doi:10.1145/ 2184319.2184339 A user ™s trust in a single device can be extended to many other devices. By BRyAn PARno Trust extension for Commodity Computers as soCIety rUshes to digitize sensitive information and services, users and developers must adopt adequate security protections. However, such protections often conflict with the benefits expected from commodity computers. Consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low cost, but attempts to construct secure systems from the ground up are expensive, time-consuming, and unable to keep up with the changing marketplace.2,8,11,12 For example, the VAX VMM security kernel was developed over nine years (1981 “1990), but the kernel was never deployed. This failure was due, in part, to the absence of support for Ethernet, a feature considered crucial by the time the kernel was completed but not anticipated when originally designed.11 CoMM uniCATio ns o f The AC M | j u ne 201 2 | vo l . 5 5 | no. 6 Rather than build secure systems from scratch, the tension between security and features can be resolved by extending the trust users have in one device to enable

Journal

Communications of the ACMAssociation for Computing Machinery

Published: Jun 1, 2012

There are no references for this article.