Analyzing trust and security in computing and communications systems

Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the le...

Full description

Saved in:
Bibliographic Details
Main Author: Pathan, Al-Sakib Khan
Other Authors: Sabu, Thampi M.
Format: Book Chapter
Language:English
English
English
English
Published: Chapman and Hall/CRC Press, USA 2013
Subjects:
Online Access:http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf
http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf
http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf
http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf
http://irep.iium.edu.my/33636/
http://www.crcpress.com/product/isbn/9781466568440
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
English
English
English
id my.iium.irep.33636
record_format dspace
spelling my.iium.irep.336362013-12-23T07:37:53Z http://irep.iium.edu.my/33636/ Analyzing trust and security in computing and communications systems Pathan, Al-Sakib Khan QA75 Electronic computers. Computer science Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the level of security felt by each person involved in various relationships. If person A does not trust person B, person A may not feel secure in the company of person B. Similarly, these terminologies could also retain the same meanings for our modern computing and communications equipments. However, a notable difference is that whereas trust and security are quite interrelated in human-life scenarios; in technical fields, these are considered as two clearly different issues with distinct boundary lines. In computing and communications fields, trust is a kind of vague term that sets the outline of a task or communication event, based on which the operation can be performed. On the other hand, security is a broad concept that ensures communications go forward in a desired manner, maintaining the core aspects of security intact, that is, privacy, authenticity, authority, integrity, and nonrepudiation. The relation between trust and security could be seen in the way that security includes the concept of trust partially, and trust stays as a wrapper before any secure or insecure communication happens within a network of devices. Chapman and Hall/CRC Press, USA Sabu, Thampi M. Bhargava, Bharat Atrey , Pradeep K. 2013 Book Chapter REM application/pdf en http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf application/pdf en http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf application/pdf en http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf application/pdf en http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf Pathan, Al-Sakib Khan (2013) Analyzing trust and security in computing and communications systems. In: Managing Trust in Cyberspace. Chapman and Hall/CRC Press, USA, USA, pp. 1-11. ISBN 9781466568440 http://www.crcpress.com/product/isbn/9781466568440 Chapter 1
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
English
English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Pathan, Al-Sakib Khan
Analyzing trust and security in computing and communications systems
description Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the level of security felt by each person involved in various relationships. If person A does not trust person B, person A may not feel secure in the company of person B. Similarly, these terminologies could also retain the same meanings for our modern computing and communications equipments. However, a notable difference is that whereas trust and security are quite interrelated in human-life scenarios; in technical fields, these are considered as two clearly different issues with distinct boundary lines. In computing and communications fields, trust is a kind of vague term that sets the outline of a task or communication event, based on which the operation can be performed. On the other hand, security is a broad concept that ensures communications go forward in a desired manner, maintaining the core aspects of security intact, that is, privacy, authenticity, authority, integrity, and nonrepudiation. The relation between trust and security could be seen in the way that security includes the concept of trust partially, and trust stays as a wrapper before any secure or insecure communication happens within a network of devices.
author2 Sabu, Thampi M.
author_facet Sabu, Thampi M.
Pathan, Al-Sakib Khan
format Book Chapter
author Pathan, Al-Sakib Khan
author_sort Pathan, Al-Sakib Khan
title Analyzing trust and security in computing and communications systems
title_short Analyzing trust and security in computing and communications systems
title_full Analyzing trust and security in computing and communications systems
title_fullStr Analyzing trust and security in computing and communications systems
title_full_unstemmed Analyzing trust and security in computing and communications systems
title_sort analyzing trust and security in computing and communications systems
publisher Chapman and Hall/CRC Press, USA
publishDate 2013
url http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf
http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf
http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf
http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf
http://irep.iium.edu.my/33636/
http://www.crcpress.com/product/isbn/9781466568440
_version_ 1643610479656960000