Editorial article: on the boundaries of trust and security in computing and communications systems

This article analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the...

Full description

Saved in:
Bibliographic Details
Main Author: Pathan, Al-Sakib Khan
Format: Article
Language:English
Published: Inderscience Publishers 2014
Subjects:
Online Access:http://irep.iium.edu.my/8462/1/IJTMCC020100_PATHAN.pdf
http://irep.iium.edu.my/8462/
http://www.inderscience.com/browse/index.php?journalCODE=ijtmcc
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.8462
record_format dspace
spelling my.iium.irep.84622015-01-11T10:47:50Z http://irep.iium.edu.my/8462/ Editorial article: on the boundaries of trust and security in computing and communications systems Pathan, Al-Sakib Khan QA75 Electronic computers. Computer science QA76 Computer software This article analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the other hand, security is about making sure that the participating entities are legitimate in a communication event or incident so that the core requirements of privacy, integrity, and authenticity are maintained. This notion is also true for our human life, even for example entering a house needs legitimacy of a person. Some boundary lines preserve the security; otherwise an unwanted access is called a ‘security breach’. The intent of this article is to compare and discuss these two terms with our societal behavior and understanding amongst entities. To illustrate these issues especially in computing and communications world, some of the innovating and recent technologies are discussed which demand trust and security within their core operational structures. Alongside presenting generally established ideas, some critical points are mentioned that may be sometimes debatable within the research community. Inderscience Publishers 2014 Article REM application/pdf en http://irep.iium.edu.my/8462/1/IJTMCC020100_PATHAN.pdf Pathan, Al-Sakib Khan (2014) Editorial article: on the boundaries of trust and security in computing and communications systems. International Journal of Trust Management in Computing and Communications (IJTMCC), 2 (1). pp. 1-6. ISSN 2048-8378 (P) 2048-8386 (O) http://www.inderscience.com/browse/index.php?journalCODE=ijtmcc
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
QA76 Computer software
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
Pathan, Al-Sakib Khan
Editorial article: on the boundaries of trust and security in computing and communications systems
description This article analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the other hand, security is about making sure that the participating entities are legitimate in a communication event or incident so that the core requirements of privacy, integrity, and authenticity are maintained. This notion is also true for our human life, even for example entering a house needs legitimacy of a person. Some boundary lines preserve the security; otherwise an unwanted access is called a ‘security breach’. The intent of this article is to compare and discuss these two terms with our societal behavior and understanding amongst entities. To illustrate these issues especially in computing and communications world, some of the innovating and recent technologies are discussed which demand trust and security within their core operational structures. Alongside presenting generally established ideas, some critical points are mentioned that may be sometimes debatable within the research community.
format Article
author Pathan, Al-Sakib Khan
author_facet Pathan, Al-Sakib Khan
author_sort Pathan, Al-Sakib Khan
title Editorial article: on the boundaries of trust and security in computing and communications systems
title_short Editorial article: on the boundaries of trust and security in computing and communications systems
title_full Editorial article: on the boundaries of trust and security in computing and communications systems
title_fullStr Editorial article: on the boundaries of trust and security in computing and communications systems
title_full_unstemmed Editorial article: on the boundaries of trust and security in computing and communications systems
title_sort editorial article: on the boundaries of trust and security in computing and communications systems
publisher Inderscience Publishers
publishDate 2014
url http://irep.iium.edu.my/8462/1/IJTMCC020100_PATHAN.pdf
http://irep.iium.edu.my/8462/
http://www.inderscience.com/browse/index.php?journalCODE=ijtmcc
_version_ 1643606134871818240