Advertisement

Author Archives

Opinion

Secure Systems Conundrum

By definition, a secure system enforces some policy it is given. For example, such a policy might prevent confidential files from being revealed or might notify the copyright holder every time an MP3 file is played. The former protects the user as an individual; the latter enables new means of charging for electronically distributed intellectual property. Both might be seen as improving the status quo. Yet whether secure systems are in practice attractive really depends on two questions: What range of policies can the system enforce? And, Who chooses what policies the system enforces?
Opinion

Inside Risks: Evolving Telephone Networks

The U.S. public telephone network (PTN) is changing—partly in response to changes in technology and partly due to deregulation. Some changes are for the better: lower prices with more choices and services for consumers. But there are other consequences and, in some ways, PTN trustworthiness is eroding. Moreover, this erosion can have far-reaching consequences. Critical […]

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved