This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Suppose We Got a Do-Over: A Revolution for Secure Computing
Nov.-Dec. 2012 (vol. 10 no. 6)
pp. 36-39
Daniel Adams, Scitor
Although visionaries think of breakthrough ideas long before the rest of us, they often think of them before there's technology ready to handle them. Would Multics or the Lisp Machine still have achieved little market success if today's VLSI technology had been ready when they were designed? Forty years ago, there were many things we wanted our computers to do (but few transistors with which to do them), and computer security was a niche concern. Today, computer security affects everybody, and we have transistors looking for useful tasks to perform, but the consequences of design decisions made in resource-constrained days remain. DARPA has launched several clean-slate programs to explore what technological visions might be realized if you didn't have to maintain compatibility with legacy architectures and OSs.
Index Terms:
Information security,Privacy,Computer security,DARPA,Computer architecture,Tagging,DARPA,protection mechanisms,application-aware adaptation,capability architectures,tagged architectures,computer security
Citation:
Howard Shrobe, Daniel Adams, "Suppose We Got a Do-Over: A Revolution for Secure Computing," IEEE Security & Privacy, vol. 10, no. 6, pp. 36-39, Nov.-Dec. 2012, doi:10.1109/MSP.2012.84
Usage of this product signifies your acceptance of the Terms of Use.