Analyzing trust and security in computing and communications systems
Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the le...
Main Author: | |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English English English English |
Published: |
Chapman and Hall/CRC Press, USA
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf |
id |
iium-33636 |
---|---|
recordtype |
eprints |
spelling |
iium-336362013-12-23T07:37:53Z http://irep.iium.edu.my/33636/ Analyzing trust and security in computing and communications systems Pathan, Al-Sakib Khan QA75 Electronic computers. Computer science Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the level of security felt by each person involved in various relationships. If person A does not trust person B, person A may not feel secure in the company of person B. Similarly, these terminologies could also retain the same meanings for our modern computing and communications equipments. However, a notable difference is that whereas trust and security are quite interrelated in human-life scenarios; in technical fields, these are considered as two clearly different issues with distinct boundary lines. In computing and communications fields, trust is a kind of vague term that sets the outline of a task or communication event, based on which the operation can be performed. On the other hand, security is a broad concept that ensures communications go forward in a desired manner, maintaining the core aspects of security intact, that is, privacy, authenticity, authority, integrity, and nonrepudiation. The relation between trust and security could be seen in the way that security includes the concept of trust partially, and trust stays as a wrapper before any secure or insecure communication happens within a network of devices. Chapman and Hall/CRC Press, USA Sabu, Thampi M. Bhargava, Bharat Atrey , Pradeep K. 2013 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf application/pdf en http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf application/pdf en http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf application/pdf en http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf Pathan, Al-Sakib Khan (2013) Analyzing trust and security in computing and communications systems. In: Managing Trust in Cyberspace. Chapman and Hall/CRC Press, USA, USA, pp. 1-11. ISBN 9781466568440 http://www.crcpress.com/product/isbn/9781466568440 Chapter 1 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English English English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Pathan, Al-Sakib Khan Analyzing trust and security in computing and communications systems |
description |
Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the level of security felt by each person involved in various relationships. If person A does not trust person B, person A may not feel secure in the company of person B. Similarly, these terminologies could also retain the same meanings for our modern computing and communications equipments. However, a notable difference is that whereas trust and security are quite interrelated in human-life scenarios; in technical fields, these are considered as two clearly different issues with distinct boundary lines. In computing and communications fields, trust is a kind of vague term that sets the outline of a task or communication event, based on which the operation can be performed. On the other hand, security is a broad concept that ensures communications go forward in a desired manner, maintaining the core aspects of security intact, that is, privacy, authenticity, authority, integrity, and nonrepudiation. The relation between trust and security could be seen in the way that security includes the concept of trust partially, and trust stays as a wrapper before any secure or insecure communication happens within a network of devices. |
author2 |
Sabu, Thampi M. |
author_facet |
Sabu, Thampi M. Pathan, Al-Sakib Khan |
format |
Book Chapter |
author |
Pathan, Al-Sakib Khan |
author_sort |
Pathan, Al-Sakib Khan |
title |
Analyzing trust and security in computing and communications systems |
title_short |
Analyzing trust and security in computing and communications systems |
title_full |
Analyzing trust and security in computing and communications systems |
title_fullStr |
Analyzing trust and security in computing and communications systems |
title_full_unstemmed |
Analyzing trust and security in computing and communications systems |
title_sort |
analyzing trust and security in computing and communications systems |
publisher |
Chapman and Hall/CRC Press, USA |
publishDate |
2013 |
url |
http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf |
first_indexed |
2023-09-18T20:48:37Z |
last_indexed |
2023-09-18T20:48:37Z |
_version_ |
1777409843731103744 |