Abstract
To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.
- 1 Bobrow, D.G., Burchfiel, J.D., Murphy, D.L., and Tomlinson, R.S. TENEX, a paged time-sharing system for the PDP-10. Commun. ACM 15, 3 (Mar. 1972), 135-143. Google Scholar
Digital Library
- 2 Kernighan, B.W., and Ritchie, D.M. The C Programming Language. Prentice-Hall, Englewood Cliffs, N.J., 1978. Google Scholar
Digital Library
- 3 Ritchie, D.M., and Thompson, K. The UNIX time-sharing system. Commun. ACM 17, (July 1974), 365-375. Google Scholar
Digital Library
- 4 Unknown Air Force Document.Google Scholar
Index Terms
Reflections on trusting trust
Recommendations
Benevolence trust: a key determinant of user continuance use of online social networks
Online social networking (OSN) has attracted increased attention and growing membership in recent years. In this paper, we propose and test an extended and unified theory of acceptance and use of technology (UTAUT) model, including the additional areas ...
Trusting Virtual Trust
Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of `dynamic, interactive, and trusting' reliance on other people, he distinguishes between two forms of ...
Trust: nature and dynamics
Trust is a complex notion -- with various components and dimensions-, and a multi-role relation: Trust (x y t G c); x trusts y as for action/task t useful for goal G, in context c.
It is an attitude, a disposition towards another agent (natural, ...








Comments