Analyzing trust and security in computing and communications systems
Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the le...
Main Author: | Pathan, Al-Sakib Khan |
---|---|
Other Authors: | Sabu, Thampi M. |
Format: | Book Chapter |
Language: | English English English English |
Published: |
Chapman and Hall/CRC Press, USA
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/ http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf |
Similar Items
-
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014) -
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015) -
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014) -
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015) -
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)