IIUM Repository

Analyzing trust and security in computing and communications systems

Pathan, Al-Sakib Khan (2013) Analyzing trust and security in computing and communications systems. In: Managing Trust in Cyberspace. Chapman and Hall/CRC Press, USA, USA, pp. 1-11. ISBN 9781466568440

[img] PDF (Corrected Proof Version after which it was published) - Accepted Version
Restricted to Registered users only

Download (2MB) | Request a copy
[img]
Preview
PDF (Cover) - Published Version
Download (212kB) | Preview
[img]
Preview
PDF (TOC) - Published Version
Download (276kB) | Preview
[img] PDF (First page) - Published Version
Restricted to Registered users only

Download (229kB) | Request a copy

Abstract

Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the level of security felt by each person involved in various relationships. If person A does not trust person B, person A may not feel secure in the company of person B. Similarly, these terminologies could also retain the same meanings for our modern computing and communications equipments. However, a notable difference is that whereas trust and security are quite interrelated in human-life scenarios; in technical fields, these are considered as two clearly different issues with distinct boundary lines. In computing and communications fields, trust is a kind of vague term that sets the outline of a task or communication event, based on which the operation can be performed. On the other hand, security is a broad concept that ensures communications go forward in a desired manner, maintaining the core aspects of security intact, that is, privacy, authenticity, authority, integrity, and nonrepudiation. The relation between trust and security could be seen in the way that security includes the concept of trust partially, and trust stays as a wrapper before any secure or insecure communication happens within a network of devices.

Item Type: Book Chapter
Additional Information: 6481/33636
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Dr. Al-Sakib Khan Pathan
Date Deposited: 23 Dec 2013 15:37
Last Modified: 23 Dec 2013 15:37
URI: http://irep.iium.edu.my/id/eprint/33636

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year