Reflections on trusting trust

  title={Reflections on trusting trust},
  author={Ken Thompson},
  journal={Commun. ACM},
  • K. Thompson
  • Published 1 August 1984
  • Computer Science
  • Commun. ACM
To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software. 
Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context
Trust is an essential component of every interaction we make. For some transactions we need very little trust, while for others we may be quite risk averse. In this paper we investigate trust in an
Inspiration and trust
Not every important problem can be solved through science and technology, but that doesn't mean they shouldn't be addressed.
Does trusted computing remedy computer security problems?
It is argued that although trusted computing has some merits, it neither provides a complete remedy nor is it likely to prevail in the PC mass market.
To trust information sources: a proposal for a modal logical framework
The meaning of trust is understood as an attitude of an agent who believes that another agent has a given property.
The epistemology of computer security
This paper studies computer security from first principles. The basic questions "Why?", "How do we know what we know?" and "What are the implications of what we believe?"
Toward an approach to measuring software trust
A set of criteria classes consisting of various trust principle combinations is shown to provide a scale for measuring and comparing trust.
Information Protection
  • R. Conley
  • Engineering
    MILCOM 1987 - IEEE Military Communications Conference - Crisis Communications: The Promise and Reality
  • 1987
The subject of information security is discussed and several methods for protection of information are reviewed. Emphasis is placed on security methods to insure their application is consistent with
The Twelve Principles of Trusted Solutions
Abstract In what follows, we discuss aspects that would make a security solution work in practice. Experience shows that adding security components does not necessarily raise the level of trust of a
Fixing federal e-voting standards
Without a threat model and a system model, voting standards cannot ensure the integrity or accuracy of the voting process.
Software on the Witness Stand: What Should It Take for Us to Trust It?
It is shown that courts tend to regard computer-generated materials as inherently trustworthy evidence, ignoring many software and platform trustworthiness problems well known to computer security researchers.


The UNIX Time-sharing System
UNIX is a general-purpose, interactive time-sharing operating system for the DEC PDP-11 and Interdata 8/32 computers. Since it became operational in 1971, it has become quite widely used. This paper
C++ Programming Language
Bjarne Stroustrup makes C even more accessible to those new to the language, while adding advanced information and techniques that even expert C programmers will find invaluable.
TENEX, a paged time sharing system for the PDP - 10
Although the implementation described here required some compromise to achieve a system operational within six months of hardware checkout, TENEX has met its major goals and provided reliable service at several sites and through the ARPA network.
TENEX: a paged time sharing system for the PDP-10
TENEX is a new time sharing system implemented on a DEC PDP-10 augmented by special paging hardware developed at BBN. This report specified a set of goals which are important for any time sharing
a paged time-sharing system for the PDP-I0
  • Commun. ACM
  • 1972
Author's Present Address: Ken Thompson
  • Author's Present Address: Ken Thompson
Author's Present Address: Ken Thompson, AT&T Bell Laboratories, Room 2C-519, 600 Mountain Ave
  • Author's Present Address: Ken Thompson, AT&T Bell Laboratories, Room 2C-519, 600 Mountain Ave
Room 2C-519. 600 Mountain Ave
  • Room 2C-519. 600 Mountain Ave
Unknown Air Force Document