Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

Governance of computer-based interactions derives from policy specification mechanisms that are grounded in trust authorities and mechanisms that can be projected across the network. The detailed architecture of individual computers and the details of their network interconnections is a function of system administration. The administrators, entities whose role is one of enacting administration functions, derive their authority of control from their identities as established within the trust infrastructure of the network.

The software through which computer based social groupings are effected is generally divided into three component domains: application software, operating system software and middleware. The concepts of application software are based in the language of the problems being addressed at any particular time. Operating system software, on the other hand, is concerned with the sensori-motor environment of the specific computer system in question. Middleware generally comprises some, or all, of the protocols that connect these two domains together.

In the computer world, there is a given with regards to any level of security: a trust infrastructure must be based on a secure computer platform. To draw a parallel to the human mind, a secure platform is one on which it is not possible to establish an altered state of consciousness. This is simply a way of saying that no outside source can be allowed to impinge on the sensori-motor environment of the secure computer. There can be no eavesdroppers to detect and perhaps modify sensitive or secret information, and there can be no substitution or modification of the stored program that controls the sensori-motor environment of the computer. At the present time, the only way to effect any level of security within an unsecured, or dubious platform, is to add yet another platform that is secure and hence trusted.

Given a trusted platform, it is possible to establish a trusted communication channel with another trusted platform across connections that are not, themselves, intrinsically trusted. This can be accomplished through the use or cryptographic processes on the trusted platforms. In the same way, two generals communicate during the battle by sending each other secret messages that cannot be understood by the enemy even if they are intercepted. This allows for creation of a single trust environment within physically disjoint systems where the space separating them is suspect. Thus, it is possible to separate the client element of an application from the server element of an application and still enable them to share a common trust environment, as long as each resides on a trusted platform.

From a trusted platform, it is also possible to measure selected characteristics of another platform in order to imbue some level of trust in that platform. Further, it is possible, again from a trusted platform, to detect changes of certain types and levels in another platform in order to evaluate whether an ostensibly trusted platform has been compromised or not.

Trusted platforms derive their trust from their intrinsic characteristics that make them difficult or impossible to manipulate or modify. The degree to which they are impervious to such manipulation is termed their level of being tamper-resistant. Today, essentially no computer platforms are inherently tamper-proof; there are mechanisms to subvert virtually all known architectures, albeit at various costs. So, given that no platform is immune from manipulation, a necessary feature of trusted platforms is that of being tamper-evident. That is, if a platform is manipulated, then it should exhibit one or more telltale signs that it has been manipulated.

Finally, another given relative to computer systems is that complexity in computer software presents an enhanced threat environment. The problem is that, today, computer programming is still a cognitive process of the human mind. At the highest levels, it requires attention and action

 

5 Fabric of Society

171

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)