Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

example of evolution in action, a term first introduced in 1981 by Larry Niven and Jerry Pournelle in their science fiction book Oath of Fealty. It suggests a characteristic of certain situations to anecdotally illustrate the evolutionary process itself.

So, as something of an afterthought, within widespread, heterogeneous computer networks, the consideration of the environment for interactions was ultimately focused on the concept of security. As it is typically used, the word or concept of security is a rather nebulous thing. Too often this ambiguity in meaning is by design rather than through imprecise usage of language. The word is intended to suggest the presence of characteristics that may not, in fact, be provided. We would suggest that a better way to refer to the cumulative set of security characteristics is through the concept of trust, but as we said, we’ll get to that down the road a bit.

So, from this beginning, the discussion in deployment circles tended to focus on security as add-on capability that needed to be somehow attached to the network, rather than a basic physiological requirement. In essence, the trust that should ensue from a high degree of security became a higher level need to be fulfilled somewhere in the protocol stack. So, at this point, we should consider the various characteristics that comprise the amalgam called security.

Within the general field of physics, in the study of interactions among particles, whether it be in the macroscopic world of classical mechanics or in the sub-atomic world of particle physics, dealing with two particles at a time is a more readily solved problem than is the situation when more than two particles are involved. In general, the equations of motion for two-body interactions offer exact solutions whereas three-body or higher groupings allow only for approximate solutions. Consequently, one approach to the classical many-body problem has been, historically, to break the problem down into a multitude of two-body interactions. A very similar situation holds in the interactions among people, which was the first guide to the behavior of computer interactions.

Our model for the interactions among people is to view them as being composed of transactions; specifically, of two party transactions. We suggest that this definition can be further refined to enumerate two very specific characterizations of a transaction. First, a transaction is time limited and second, or perhaps the corollary, a transaction has a well-defined beginning and a well-defined conclusion or outcome. Within the world of computer systems and computer networks, we tend to think in terms of a preferred environment in which we can conduct transactions. Operating within some known security infrastructure, the preferred transaction environment provides some degree of the following characteristics:

     -       Privacy

     -       Authentication

     -       Authorization

     -       Information Integrity

     -       Transaction history providing non-repudiation

These five areas, encompassed as they must be by some means of establishing their respective characteristics, form the metric by which we judge the efficacy of the security of computer systems and computer networks. It is in this playground that personal electronic devices become the big kid players. So, what do these characteristics really mean in the computer world? Well, they mean much the same thing as they do in our everyday world, since these are also characteristics that we must establish to some degree for any type of interaction among people.

100

3 Environment

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)