A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Trust extension for commodity computers
2012
Communications of the ACM
contributed articles as soCIety rUshes to digitize sensitive information and services, users and developers must adopt adequate security protections. However, such protections often conflict with the benefits expected from commodity computers. Consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low cost, but attempts to construct secure systems from the ground up are expensive, time-consuming, and unable to keep up
doi:10.1145/2184319.2184339
fatcat:oxr7zwebyjhelpxt2quhbn5oai