TITLE

Anarchy and Order

AUTHOR(S)
Booch, Grady
PUB. DATE
May 2015
SOURCE
IEEE Software;May2015, Vol. 32 Issue 3, p20
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Computing amplifies governments' actions but can also temper their behavior by enabling mechanisms for private communication and for open, transparent communication by a nation's people Similarly, governments can help focus the artifacts of computing on their citizens' health and happiness, and temper it as well. The Web extra at http://youtu.be/GuFNqmvbkrE is an audio podcast of Grady Booch's On Computing column, in which he discusses how computing amplifies the actions of governments, but can also temper its behavior by enabling mechanisms for private communication as well as for open and transparent communication by the people of a nation. Similarly, governments can help focus the artifacts of computing to the health and happiness of its citizens, but temper it as well.
ACCESSION #
102288018

 

Related Articles

  • Trojan Detection Simulation Group Under The Cloud Computing Environment. WangNing // Applied Mechanics & Materials;2014, Issue 602-605, p1996 

    The accurate method for Trojan group detection under cloud computing environment is studied in this paper. For the problem of Trojan group detection under the cloud computing environment, this paper proposed a Trojan group detection method based on the BP neural network. BP neural network model...

  • On the Identification of Covert Storage Channels in Secure Systems. Tsai, Chii-ren; Gligor, Virgil D.; Chandersekaran, C. Sekar // IEEE Transactions on Software Engineering;Jun90, Vol. 16 Issue 6, p569 

    A practical method for the identification of covert storage channels is presented and its application to the source code of the Secure Xenixâ„¢ kernel is illustrated. The method is based on the identification of all visible/alterable kernel variables by using information-flow analysis of...

  • CBSE as Novel Approach for IDS. Angurala, Mohit; Rani, Malti // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p4152 

    This paper gives a new approach called Component based software engineering for designing an intrusion detection system. This paper also tells that before this component based software approach, other traditional approaches were used for designing intrusion detection system. But due to various...

  • A Weakness in 3pek Exchange Protocol using Parallel Message Transmission Technique. Raghuvamshi, Archana; Premchand, P. // International Journal of Advanced Research in Computer Science;Nov/Dec2013, Vol. 4 Issue 11, p104 

    Three-party encrypted key (3pek) exchange protocol plays an obligatory role in area of the secure communication in which two users can agree a common session key based on a low entropy password. In 2002, a password authenticated key exchange protocol based on RSA proposed by Zhu et al.. Later,...

  • Searching Encrypted Data on Cloud. Khan, Muhammad Sajid; Chengliang Wang; Kulsoom, Ayesha; Ullah, Zabeeh // International Journal of Computer Science Issues (IJCSI);Nov2013, Vol. 10 Issue 6, p230 

    Encryption is an optimistic way to preserve the secrecy of the outsource data. On other hand, performing search operation on encrypted data is a complicated job. A lot of encryption techniques have been suggested by researchers to avoid improper usage of unstructured data on the cloud. But still...

  • Identity - Based Multiple Key Agreement Scheme. Dehkordi, Massoud Hadian; Alimoradi, Reza // KSII Transactions on Internet & Information Systems;Dec2011, Vol. 5 Issue 12, p2392 

    In order to protect some important information communicated through an insecure network, a common hidden key must be used. One can produce the common hidden key using key agreement protocols; and this helps to have high security in modern data networks. Today, the designers of public key...

  • Six ways to limit your exposure to cyber attacks. Pierson, Christopher T. // Inside Tucson Business;1/24/2005, Vol. 14 Issue 33, Special section p1 

    This article focuses on cyber security. Businesses that store data in a digital format should have their security assessed by legal and information technology professionals. Using a firewall is much like closing and locking the doors to your home or office. Entry and exit are only allowed to...

  • Anomaly Detection based on Machine Learning: Dimensionality Reduction using PCA and Classification using SVM. George, Annie // International Journal of Computer Applications;6/1/2012, Vol. 47, p5 

    Anomaly detection has emerged as an important technique in many application areas mainly for network security. Anomaly detection based on machine learning algorithms considered as the classification problem on the network data has been presented here. Dimensionality reduction and classification...

  • What DMZ is and what it means for your business. leClair, Lee // Inside Tucson Business;4/16/2007, Vol. 16 Issue 45, p11 

    The article discusses the importance of a firewall and demilitarized zone (DMZ) on computer networks and to the business. DMZ allows limited access to information through the Internet but, since there is exposure to the Internet there is still a possibility of risk. It is important for IT...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics