PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security.This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.
This open book is licensed under a Creative Commons License (CC BY). You can download The Huawei and Snowden Questions ebook for free in PDF format (2.5 MB).
The Huawei and Snowden Questions
Digital dissertations have been a part of academic research for years now, yet there are still many questions surrounding their processes. Are interactive dissertations significantly different from their paper-based counterparts? What are the effects of digital projects on doctoral education? How does one choose and defend a digital dissertation? T...
This is the first book-length exploration of the thoughts and experiences expressed by dementia patients in published narratives over the last thirty years. It contrasts third-person caregiver and first-person patient accounts from different languages and a range of media, focusing on the poetical and political questions these narratives raise: wha...
Macroeconomics: Theory, Markets, and Policy by D. Curtis and I. Irvine provides complete, concise coverage of introductory macroeconomics theory and policy.
The textbook observes short-run macroeconomic performance, analysis, and policy motivated by the recessions of the early 1980s and 1990s, the financial crisis and recession of 2008-2009, and...
We've all heard it: according to Hal Varian, statistics is the next sexy job. Five years ago, in What is Web 2.0, Tim O'Reilly said that "data is the next Intel Inside." But what does that statement mean? Why do we suddenly care about statistics and about data? This report examines the many sides of data science - the technologi...
Quoting is all around us. But do we really know what it means? How do people actually quote today, and how did our present systems come about? This book brings together a down-to-earth account of contemporary quoting with an examination of the comparative and historical background that lies behind it and the characteristic way that quoting links pa...
The LNCS 11427 and 11428 proceedings set constitutes the proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019.