Trust (and mistrust) in secure applications

Trust (and mistrust) in secure applications TRUST (AND MISTRUST) IN SECURE APPLICATIONS Exploring and considering trust assumptions during every stage of software development. Trust and trustworthiness are (the so-called trust assumptions). If the the foundations of security. Hometrusted entities satisfy these properties, John Viega, owners trust lock manufacturers to then they are trustworthy. Unfortucreate quality locks to protect their nately, because these properties are selhomes. Some locks are trustworthy; Tadayoshi Kohno, dom explicitly defined, misguided trust others are not. Businesses trust securelationships in software applications rity guards to admit only authorized and Bruce Potter are not uncommon. personnel into sensitive areas. Some Software developers have trust relasecurity guards should be trusted; tionships during every stage of software some should not. CGI programmers trust users development. Before a software project is conto provide valid inputs to the data fields on ceived, there are business and personal trust Web pages. Although most users can be relationships that developers generally assume trusted, some cannot. The basis for these trust will not be abused. For example, many corporelationships and how they are formed can drarations trust that their employees will not matically affect the underlying security of any attack the information systems of the company. system ”be it http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Communications of the ACM Association for Computing Machinery

Trust (and mistrust) in secure applications

Loading next page...
 
/lp/association-for-computing-machinery/trust-and-mistrust-in-secure-applications-JCQX3EvgP2
Publisher
Association for Computing Machinery
Copyright
Copyright © 2001 by ACM Inc.
ISSN
0001-0782
DOI
10.1145/359205.359223
Publisher site
See Article on Publisher Site

Abstract

TRUST (AND MISTRUST) IN SECURE APPLICATIONS Exploring and considering trust assumptions during every stage of software development. Trust and trustworthiness are (the so-called trust assumptions). If the the foundations of security. Hometrusted entities satisfy these properties, John Viega, owners trust lock manufacturers to then they are trustworthy. Unfortucreate quality locks to protect their nately, because these properties are selhomes. Some locks are trustworthy; Tadayoshi Kohno, dom explicitly defined, misguided trust others are not. Businesses trust securelationships in software applications rity guards to admit only authorized and Bruce Potter are not uncommon. personnel into sensitive areas. Some Software developers have trust relasecurity guards should be trusted; tionships during every stage of software some should not. CGI programmers trust users development. Before a software project is conto provide valid inputs to the data fields on ceived, there are business and personal trust Web pages. Although most users can be relationships that developers generally assume trusted, some cannot. The basis for these trust will not be abused. For example, many corporelationships and how they are formed can drarations trust that their employees will not matically affect the underlying security of any attack the information systems of the company. system ”be it

Journal

Communications of the ACMAssociation for Computing Machinery

Published: Feb 1, 2001

There are no references for this article.

You’re reading a free preview. Subscribe to read the entire article.


DeepDyve is your
personal research library

It’s your single place to instantly
discover and read the research
that matters to you.

Enjoy affordable access to
over 18 million articles from more than
15,000 peer-reviewed journals.

All for just $49/month

Explore the DeepDyve Library

Search

Query the DeepDyve database, plus search all of PubMed and Google Scholar seamlessly

Organize

Save any article or search result from DeepDyve, PubMed, and Google Scholar... all in one place.

Access

Get unlimited, online access to over 18 million full-text articles from more than 15,000 scientific journals.

Your journals are on DeepDyve

Read from thousands of the leading scholarly journals from SpringerNature, Wiley-Blackwell, Oxford University Press and more.

All the latest content is available, no embargo periods.

See the journals in your area

DeepDyve

Freelancer

DeepDyve

Pro

Price

FREE

$49/month
$360/year

Save searches from
Google Scholar,
PubMed

Create folders to
organize your research

Export folders, citations

Read DeepDyve articles

Abstract access only

Unlimited access to over
18 million full-text articles

Print

20 pages / month

PDF Discount

20% off