Perspectives on Trusted Computer Systems

Perspectives on Trusted Computer Systems

Author: Willis H. Ware

Publisher:

Published: 1988

Total Pages: 28

ISBN-13:

DOWNLOAD EBOOK

The topic of this paper is trusted computer systems and their place in the world, as well as their contribution to the overall cause of computer security. First, however, there are some background aspects to deal with, so that it is clear what the issues are and what the specialized terminology means. Since the concept of trusted systems originated in the United States, the general context of the following discussion is the historical evolution of the computer security issue there. (sdw).


Trust in Technology: A Socio-Technical Perspective

Trust in Technology: A Socio-Technical Perspective

Author: Karen Clarke

Publisher: Springer Science & Business Media

Published: 2006-03-02

Total Pages: 256

ISBN-13: 9781402042577

DOWNLOAD EBOOK

Computer systems can only deliver benefits if functionality, users and usability are central to their design and deployment. This book encapsulates work done in the DIRC project (Interdisciplinary Research Collaboration in Dependability), bringing together a range of disciplinary approaches - computer science, sociology and software engineering - to produce a socio-technical systems perspective on the issues surrounding trust in technology in complex settings.


Computer Architecture and Security

Computer Architecture and Security

Author: Shuangbao Paul Wang

Publisher: John Wiley & Sons

Published: 2013-01-10

Total Pages: 342

ISBN-13: 111816881X

DOWNLOAD EBOOK

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace. Examination of memory, CPU architecture and system implementation Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Design and implementation of a patent-pending secure computer system Includes the latest patent-pending technologies in architecture security Placement of computers in a security fulfilled network environment Co-authored by the inventor of the modern Computed Tomography (CT) scanner Provides website for lecture notes, security tools and latest updates


Machines We Trust

Machines We Trust

Author: Marcello Pelillo

Publisher: MIT Press

Published: 2021-08-24

Total Pages: 175

ISBN-13: 0262362163

DOWNLOAD EBOOK

Experts from disciplines that range from computer science to philosophy consider the challenges of building AI systems that humans can trust. Artificial intelligence-based algorithms now marshal an astonishing range of our daily activities, from driving a car ("turn left in 400 yards") to making a purchase ("products recommended for you"). How can we design AI technologies that humans can trust, especially in such areas of application as law enforcement and the recruitment and hiring process? In this volume, experts from a range of disciplines discuss the ethical and social implications of the proliferation of AI systems, considering bias, transparency, and other issues. The contributors, offering perspectives from computer science, engineering, law, and philosophy, first lay out the terms of the discussion, considering the "ethical debts" of AI systems, the evolution of the AI field, and the problems of trust and trustworthiness in the context of AI. They go on to discuss specific ethical issues and present case studies of such applications as medicine and robotics, inviting us to shift the focus from the perspective of a "human-centered AI" to that of an "AI-decentered humanity." Finally, they consider the future of AI, arguing that, as we move toward a hybrid society of cohabiting humans and machines, AI technologies can become humanity's allies.


Computer Systems

Computer Systems

Author: Randal E.. Bryant

Publisher:

Published: 2013-07-23

Total Pages: 962

ISBN-13: 9781292025841

DOWNLOAD EBOOK

For Computer Systems, Computer Organization and Architecture courses in CS, EE, and ECE departments. Few students studying computer science or computer engineering will ever have the opportunity to build a computer system. On the other hand, most students will be required to use and program computers on a near daily basis. Computer Systems: A Programmer's Perspective introduces the important and enduring concepts that underlie computer systems by showing how these ideas affect the correctness, performance, and utility of application programs. The text's hands-on approach (including a comprehensive set of labs) helps students understand the under-the-hood operation of a modern computer system and prepares them for future courses in systems topics such as compilers, computer architecture, operating systems, and networking.


Mechanizing Proof

Mechanizing Proof

Author: Donald MacKenzie

Publisher: MIT Press

Published: 2004-01-30

Total Pages: 448

ISBN-13: 9780262632959

DOWNLOAD EBOOK

Most aspects of our private and social lives—our safety, the integrity of the financial system, the functioning of utilities and other services, and national security—now depend on computing. But how can we know that this computing is trustworthy? In Mechanizing Proof, Donald MacKenzie addresses this key issue by investigating the interrelations of computing, risk, and mathematical proof over the last half century from the perspectives of history and sociology. His discussion draws on the technical literature of computer science and artificial intelligence and on extensive interviews with participants. MacKenzie argues that our culture now contains two ideals of proof: proof as traditionally conducted by human mathematicians, and formal, mechanized proof. He describes the systems constructed by those committed to the latter ideal and the many questions those systems raise about the nature of proof. He looks at the primary social influence on the development of automated proof—the need to predict the behavior of the computer systems upon which human life and security depend—and explores the involvement of powerful organizations such as the National Security Agency. He concludes that in mechanizing proof, and in pursuing dependable computer systems, we do not obviate the need for trust in our collective human judgment.


Computers at Risk

Computers at Risk

Author: National Research Council

Publisher: National Academies Press

Published: 1990-02-01

Total Pages: 320

ISBN-13: 0309043883

DOWNLOAD EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.


Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives

Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives

Author: Latusek, Dominika

Publisher: IGI Global

Published: 2010-04-30

Total Pages: 382

ISBN-13: 1615209026

DOWNLOAD EBOOK

"This book brings together scholars with significantly different backgrounds who share interests in the interplay between trust and technology, presenting novel theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-repairing, and trust-destroying practices in the context of technology"--Provided by publisher.