Analyzing trust and security in computing and communications systems
Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the le...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English English English English |
Published: |
Chapman and Hall/CRC Press, USA
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf http://irep.iium.edu.my/33636/ http://www.crcpress.com/product/isbn/9781466568440 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English English English English |
Internet
http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdfhttp://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf
http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf
http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf
http://irep.iium.edu.my/33636/
http://www.crcpress.com/product/isbn/9781466568440