
Trustworthy Computing at APLIn the 21st century, cyberspace has emerged as the foundation for a new way of life and a new approach to warfighting. We are in the early stages of conquering this man-made space, just as humanity has conquered the sea, air, and outer-space domains in previous centuries. This issue of the Johns Hopkins APL Technical Digest describes the use of formal methods, software analysis, new languages, new hardware, and new protocols to derive the principles and define the techniques of trustworthy computing that will allow the safe use of cyberspace. |
|
Trustworthy Computing: Making Cyberspace Safe—Guest Editor's Introduction Applying Mathematical Logic to Create Zero-Defect Software Theory and Practice of Mechanized Software
Analysis Ensuring the Integrity of Running Java Programs Analysis of Virtual Machine Record and Replay for Trustworthy Computing Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
|
Inside back cover (PDF) | Web-ready front cover (JPG) | High-resolution front cover (PDF) |
|
NOTE: First-time users will need to load Adobe Acrobat Reader. For assistance, see your Systems Administrator.
|
|