Computer Security in the Real World

  • Authors:
  • B. W. Lampson

  • Affiliations:
  • Microsoft

  • Venue:
  • Computer
  • Year:
  • 2004

Quantified Score

Hi-index 4.10

Visualization

Abstract

Despite many computer security successes over the past 30 years, the security of the hundreds of millions of deployed computer systems remains terrible. A determined and competent attacker could destroy or steal most of the information on these systems. Even worse, an attacker could do this to millions of systems at once.The chain of trust offers a sound basis for securing systems by logging and auditing access control decisions. Principals with hierarchical names are especially important. A parent can delegate for all of its children. Rooting name spaces in keys avoids any need for a globally trusted root. The basic scheme can be varied as well by, for example, changing how it stores and transmits bytes, collects and summarizes evidence for links, expresses sets of statements, and structures compound principals.