The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2009 vol.7)
pp: 57-59
Vijay Varadharajan , Macquarie University
ABSTRACT
With our ever-increasing reliance on a digital economy, most business and government activities now depend on networked information systems for their basic operation. Clearly, we're seeing a renewed urgency to get a better handle on capturing and reasoning about trust in computing systems and information services. Even Microsoft has adopted the term trustworthy computing as a company initiative in both its internal software development and its commercial offerings. In this installment of On the Horizon, the author takes a short journey through the concept and evolution of trust in the secure computing technology world, and examines some of the challenges involved in trusted computing today.
INDEX TERMS
on the horizon, security, privacy, trust, trusted computing, networked computing
CITATION
Vijay Varadharajan, "A Note on Trust-Enhanced Security", IEEE Security & Privacy, vol.7, no. 3, pp. 57-59, May/June 2009, doi:10.1109/MSP.2009.59
REFERENCES
1. N. Luhmann, Trust and Power, Wiley &Sons, 1979.
2. M. Deutsch, Cooperation and Trust: Some Theoretical Notes, Nebraska Univ. Press, 1962.
3. D. Gambetta, Trust, Basil Blackwell, 1990.
4. Trusted Computer System Evaluation Criteria (TCSEC), DoD5200.28-STD, US Dept. of Defense, Dec. 1985.
5. M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc IEEE Conf. Security and Privacy, IEEE Press, 1996, pp. 164–173.
6. S. Pearson et al., Trusted Computing Platforms, TCPA Technology in Context, Prentice Hall, 2002.
7. C. Lin and V. Varadharajan, "A Hybrid Trust Model for Enhancing Security in Distributed Systems," Proc. Int'l Conf. Availability, Reliability and Security (ARES 07), IEEE CS Press, 2007, pp. 35–42; http://doi.ieeecomputersociety.org/10.1109 ARES.2007.6.
23 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool