IIUM Repository

Editorial article: on the boundaries of trust and security in computing and communications systems

Pathan, Al-Sakib Khan (2014) Editorial article: on the boundaries of trust and security in computing and communications systems. International Journal of Trust Management in Computing and Communications (IJTMCC), 2 (1). pp. 1-6. ISSN 2048-8378 (P) 2048-8386 (O)

[img] PDF - Published Version
Restricted to Repository staff only

Download (38kB) | Request a copy

Abstract

This article analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the other hand, security is about making sure that the participating entities are legitimate in a communication event or incident so that the core requirements of privacy, integrity, and authenticity are maintained. This notion is also true for our human life, even for example entering a house needs legitimacy of a person. Some boundary lines preserve the security; otherwise an unwanted access is called a ‘security breach’. The intent of this article is to compare and discuss these two terms with our societal behavior and understanding amongst entities. To illustrate these issues especially in computing and communications world, some of the innovating and recent technologies are discussed which demand trust and security within their core operational structures. Alongside presenting generally established ideas, some critical points are mentioned that may be sometimes debatable within the research community.

Item Type: Article (other)
Additional Information: 6481/8462
Uncontrolled Keywords: trust, security, computing, human, communication
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Dr. Al-Sakib Khan Pathan
Date Deposited: 23 Dec 2012 06:36
Last Modified: 11 Jan 2015 18:47
URI: http://irep.iium.edu.my/id/eprint/8462

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year