Communications of the ACM
With microscope and tweezers: the worm from MIT's perspective
Communications of the ACM
On building systems that will fail
Communications of the ACM - Special issue on LISP
Illustrative risks to the public in the use of computer systems and related technology
ACM SIGSOFT Software Engineering Notes
Computer related risks
Communications of the ACM
Proof techniques for hierarchically structured programs
Communications of the ACM
On the criteria to be used in decomposing systems into modules
Communications of the ACM
The structure of the “THE”-multiprogramming system
Communications of the ACM
A verifiable secret shuffle and its application to e-voting
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Design and verification of secure systems
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Electronic vote tabulation checks and balances
Electronic vote tabulation checks and balances
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
The role of motherhood in the pop art of system programming
SOSP '69 Proceedings of the second symposium on Operating systems principles
Vulnerabilities of network control protocols: an example
ACM SIGSOFT Software Engineering Notes
Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors
IEEE Security and Privacy
Virtual machines, virtual security?
Communications of the ACM
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
Compositional modeling for data-centric business applications
SC'08 Proceedings of the 7th international conference on Software composition
Hi-index | 0.01 |
Characteristic problem areas experienced in the past are considered here, as well as some of the challenges that must be confronted in trying to achieve greater trustworthiness in computer systems and networks and in the overall environments in which they must operate. Some system development recommendations for the future are also discussed.