Analyzing trust and security in computing and communications systems
Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the le...
Main Author: | |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English English English English |
Published: |
Chapman and Hall/CRC Press, USA
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf |
Internet
http://irep.iium.edu.my/33636/http://irep.iium.edu.my/33636/
http://irep.iium.edu.my/33636/
http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf
http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf
http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf
http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf