Visible to the public Reflections on Trusting Trust

TitleReflections on Trusting Trust
Publication TypeJournal Article
Year of Publication1984
AuthorsThompson, Ken
JournalCommun. ACM
Volume27
Pagination761–763
ISSN0001-0782
KeywordsScience of Security Significant Paper
Abstract

To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.

Notes

This article was identified by the SoS Best Scientific Cybersecurity Paper Competition Distinguished Experts as a Science of Security Significant Paper. The Science of Security Paper Competition was developed to recognize and honor recently published papers that advance the science of cybersecurity. During the development of the competition, members of the Distinguished Experts group suggested that listing papers that made outstanding contributions, empirical or theoretical, to the science of cybersecurity in earlier years would also benefit the research community.

URLhttp://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf
DOI10.1145/358198.358210
Original Publicationhttp://doi.acm.org/10.1145/358198.358210
Citation KeyThompson:1984:RTT:358198.358210