This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Note on Trust-Enhanced Security
May/June 2009 (vol. 7 no. 3)
pp. 57-59
Vijay Varadharajan, Macquarie University
With our ever-increasing reliance on a digital economy, most business and government activities now depend on networked information systems for their basic operation. Clearly, we're seeing a renewed urgency to get a better handle on capturing and reasoning about trust in computing systems and information services. Even Microsoft has adopted the term trustworthy computing as a company initiative in both its internal software development and its commercial offerings. In this installment of On the Horizon, the author takes a short journey through the concept and evolution of trust in the secure computing technology world, and examines some of the challenges involved in trusted computing today.

1. N. Luhmann, Trust and Power, Wiley &Sons, 1979.
2. M. Deutsch, Cooperation and Trust: Some Theoretical Notes, Nebraska Univ. Press, 1962.
3. D. Gambetta, Trust, Basil Blackwell, 1990.
4. Trusted Computer System Evaluation Criteria (TCSEC), DoD5200.28-STD, US Dept. of Defense, Dec. 1985.
5. M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc IEEE Conf. Security and Privacy, IEEE Press, 1996, pp. 164–173.
6. S. Pearson et al., Trusted Computing Platforms, TCPA Technology in Context, Prentice Hall, 2002.
7. C. Lin and V. Varadharajan, "A Hybrid Trust Model for Enhancing Security in Distributed Systems," Proc. Int'l Conf. Availability, Reliability and Security (ARES 07), IEEE CS Press, 2007, pp. 35–42; http://doi.ieeecomputersociety.org/10.1109 ARES.2007.6.

Index Terms:
on the horizon, security, privacy, trust, trusted computing, networked computing
Citation:
Vijay Varadharajan, "A Note on Trust-Enhanced Security," IEEE Security & Privacy, vol. 7, no. 3, pp. 57-59, May-June 2009, doi:10.1109/MSP.2009.59
Usage of this product signifies your acceptance of the Terms of Use.