Computer security in the real world

被引:86
作者
Lampson, BW [1 ]
机构
[1] Microsoft Corp, Res, Redmond, WA 98052 USA
关键词
D O I
10.1109/MC.2004.17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 [计算机科学与技术];
摘要
Most computers are insecure because security is expensive. Security depends on authentication, authorization, and auditing: the gold standard. The key to uniform security in the Internet is the idea of one security principal speaking for-another.
引用
收藏
页码:37 / 46
页数:10
相关论文
共 23 条
[1]
Prudent engineering practice for cryptographic protocols [J].
Abadi, M ;
Needham, R .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) :6-15
[2]
WHY CRYPTOSYSTEMS FAIL [J].
ANDERSON, RJ .
COMMUNICATIONS OF THE ACM, 1994, 37 (11) :32-40
[3]
[Anonymous], P ACM S OP SYST PRIN
[4]
BELL DE, 1974, M74244 MITR CORP
[5]
*CERT COORD CTR, 2000, CERT ADV CA 2000 04
[6]
Clark D. D., 1987, Proceedings of the 1987 IEEE Symposium on Security and Privacy (Cat. No.87CH2416-6), P184
[7]
LATTICE MODEL OF SECURE INFORMATION-FLOW [J].
DENNING, DE .
COMMUNICATIONS OF THE ACM, 1976, 19 (05) :236-243
[8]
Eastlake Donald E., 1997, RFC 2065
[9]
ELLISON C, 1999, 2693 RFC
[10]
A trusted open platform [J].
England, P ;
Lampson, B ;
Manferdelli, J ;
Peinado, M ;
Willman, B .
COMPUTER, 2003, 36 (07) :55-+