• DocumentCode
    773337
  • Title

    In computers we trust

  • Author

    Birman, Ken

  • Author_Institution
    Dept. of Comput. Sci., Cornell Univ., Ithaca, NY, USA
  • Volume
    6
  • Issue
    11
  • fYear
    2005
  • fDate
    6/27/1905 12:00:00 AM
  • Abstract
    Computing systems are finding their way into increasingly sensitive roles and settings and for these and other uses, we need computers we can trust. The author states that unless we begin to teach our students how to build trustworthy computing systems, viewing trust in an enlarged way, and use that broad perspective to help frame the underlying technical issues, we can´t expect those students to go forth and build those systems. Until we begin a broader dialog with those who are impacted by computing - indeed, immersed in computing - and yet aren´t viewed as traditional stakeholders in the dialog, we´ll continue to build systems that impact them negatively without appreciating our actions´ consequences. It´s about time for a new engagement on the trust issue. To develop computer systems we can trust, we´ll need a broader social appreciation of the dimensions and limitations of trust in technology. And we need to begin to take control of those limitations´ implications, rather than blindly building and deploying systems that simply can´t rise to the standards of trust that their roles would seem to demand.
  • Keywords
    security of data; training; social appreciation; student training; trustworthy computing systems; privacy; security; trust; trustworthy computing;
  • fLanguage
    English
  • Journal_Title
    Distributed Systems Online, IEEE
  • Publisher
    ieee
  • ISSN
    1541-4922
  • Type

    jour

  • DOI
    10.1109/MDSO.2005.57
  • Filename
    1563973