System security, platform security and usability

STC@CCS Pub Date : 2010-10-04 DOI:10.1145/1867635.1867636
P. V. Oorschot
{"title":"System security, platform security and usability","authors":"P. V. Oorschot","doi":"10.1145/1867635.1867636","DOIUrl":null,"url":null,"abstract":"Scalable trusted computing seeks to apply and extend the fundamental technologies of trusted computing to large-scale systems. To provide the functionality demanded by users, bootstrapping a trusted platform is but the first of many steps in a complex, evolving mesh of components. The bigger picture involves building up many additional layers to allow computing and communication across large-scale systems, while delivering a system retaining some hint of the original trust goal. Not to be lost in the shuffle is the most important element: the system's human users. Unlike 40 years ago, they cannot all be assumed to be computer experts, under the employ of government agencies which provide rigorous and regular training, always on tightly controlled hardware and software platforms. It seems obvious that the design of scalable trusted computing systems necessarily must involve, as an immutable design constraint, realistic expectations of the actions and capabilities of normal human users. Experience shows otherwise. The security community does not have a strong track record of learning from user studies, nor of acknowledging that it is generally impossible to predict the actions of ordinary users other than by observing (e.g., through user experience studies) the actions such users actually take in the precise target conditions. We assert that because the design of scalable trusted computing systems spans the full spectrum from hardware to software to human users, experts in all these areas are essential to the end-goal of scalable trusted computing.","PeriodicalId":421537,"journal":{"name":"STC@CCS","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"STC@CCS","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1867635.1867636","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Scalable trusted computing seeks to apply and extend the fundamental technologies of trusted computing to large-scale systems. To provide the functionality demanded by users, bootstrapping a trusted platform is but the first of many steps in a complex, evolving mesh of components. The bigger picture involves building up many additional layers to allow computing and communication across large-scale systems, while delivering a system retaining some hint of the original trust goal. Not to be lost in the shuffle is the most important element: the system's human users. Unlike 40 years ago, they cannot all be assumed to be computer experts, under the employ of government agencies which provide rigorous and regular training, always on tightly controlled hardware and software platforms. It seems obvious that the design of scalable trusted computing systems necessarily must involve, as an immutable design constraint, realistic expectations of the actions and capabilities of normal human users. Experience shows otherwise. The security community does not have a strong track record of learning from user studies, nor of acknowledging that it is generally impossible to predict the actions of ordinary users other than by observing (e.g., through user experience studies) the actions such users actually take in the precise target conditions. We assert that because the design of scalable trusted computing systems spans the full spectrum from hardware to software to human users, experts in all these areas are essential to the end-goal of scalable trusted computing.
系统安全性、平台安全性和可用性
可伸缩可信计算寻求将可信计算的基本技术应用和扩展到大规模系统。为了提供用户所需的功能,引导一个可信的平台只是复杂的、不断发展的组件网格中的许多步骤中的第一步。更大的图景包括构建许多额外的层,以允许跨大型系统的计算和通信,同时交付一个保留原始信任目标的系统。不要在混乱中迷失是最重要的因素:系统的人类用户。与40年前不同的是,他们不可能都被认为是计算机专家,在政府机构的雇佣下,提供严格和定期的培训,总是在严格控制的硬件和软件平台上。显然,可伸缩可信计算系统的设计必须包含对普通人类用户的操作和能力的现实期望,这是不可变的设计约束。经验告诉我们并非如此。安全社区没有从用户研究中学习的良好记录,也没有承认通常不可能预测普通用户的行为,除非通过观察(例如,通过用户体验研究)这些用户在精确的目标条件下实际采取的行为。我们断言,由于可伸缩可信计算系统的设计跨越了从硬件到软件再到人类用户的全部范围,因此所有这些领域的专家对于可伸缩可信计算的最终目标至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信