DocumentCode :
1503644
Title :
Usefulness Is Not Trustworthiness
Author :
Cox, Landon P.
Author_Institution :
• Duke University
Volume :
15
Issue :
3
fYear :
2011
Firstpage :
79
Lastpage :
80
Abstract :
When discussing ways to ensure that a system remains predictable in the face of bugs, attacks, and failures, the students inevitably reach a point where they have to trust that something or set of things behaves as advertised. If a system is well-designed, then this set of trusted components will be small, and interactions between trusted and untrusted components will be constrained by a set of narrow, well understood interfaces. Mobile phones have placed communication, sensing, and computation at the center of nearly all human activity. A great deal of the software written for this new platform is extraordinarily fun and useful.
Keywords :
computer crime; mobile computing; mobile phone; trusted component; Cellular phones; Google; Mobile communication; Mobile handsets; Operating systems; Trojan horses; Internet computing; mobile devices; privacy;
fLanguage :
English
Journal_Title :
Internet Computing, IEEE
Publisher :
ieee
ISSN :
1089-7801
Type :
jour
DOI :
10.1109/MIC.2011.69
Filename :
5755604
Link To Document :
بازگشت