DocumentCode
773337
Title
In computers we trust
Author
Birman, Ken
Author_Institution
Dept. of Comput. Sci., Cornell Univ., Ithaca, NY, USA
Volume
6
Issue
11
fYear
2005
fDate
6/27/1905 12:00:00 AM
Abstract
Computing systems are finding their way into increasingly sensitive roles and settings and for these and other uses, we need computers we can trust. The author states that unless we begin to teach our students how to build trustworthy computing systems, viewing trust in an enlarged way, and use that broad perspective to help frame the underlying technical issues, we can´t expect those students to go forth and build those systems. Until we begin a broader dialog with those who are impacted by computing - indeed, immersed in computing - and yet aren´t viewed as traditional stakeholders in the dialog, we´ll continue to build systems that impact them negatively without appreciating our actions´ consequences. It´s about time for a new engagement on the trust issue. To develop computer systems we can trust, we´ll need a broader social appreciation of the dimensions and limitations of trust in technology. And we need to begin to take control of those limitations´ implications, rather than blindly building and deploying systems that simply can´t rise to the standards of trust that their roles would seem to demand.
Keywords
security of data; training; social appreciation; student training; trustworthy computing systems; privacy; security; trust; trustworthy computing;
fLanguage
English
Journal_Title
Distributed Systems Online, IEEE
Publisher
ieee
ISSN
1541-4922
Type
jour
DOI
10.1109/MDSO.2005.57
Filename
1563973
Link To Document