Issue No. 06 - Nov.-Dec. (2012 vol. 10)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2012.84
Howard Shrobe , DARPA
Daniel Adams , Scitor
Although visionaries think of breakthrough ideas long before the rest of us, they often think of them before there's technology ready to handle them. Would Multics or the Lisp Machine still have achieved little market success if today's VLSI technology had been ready when they were designed? Forty years ago, there were many things we wanted our computers to do (but few transistors with which to do them), and computer security was a niche concern. Today, computer security affects everybody, and we have transistors looking for useful tasks to perform, but the consequences of design decisions made in resource-constrained days remain. DARPA has launched several clean-slate programs to explore what technological visions might be realized if you didn't have to maintain compatibility with legacy architectures and OSs.
Information security, Privacy, Computer security, DARPA, Computer architecture, Tagging, DARPA, protection mechanisms, application-aware adaptation, capability architectures, tagged architectures, computer security
Howard Shrobe, Daniel Adams, "Suppose We Got a Do-Over: A Revolution for Secure Computing", IEEE Security & Privacy, vol. 10, no. , pp. 36-39, Nov.-Dec. 2012, doi:10.1109/MSP.2012.84