Analyzing trust and security in computing and communications systems
Whether trust should be considered completely within the perimeter of security in computing and communications systems is a debatable issue. In normal human life, we see these two terms go hand in hand to define the relationships we might have with fellow human beings. Trust among people sets the le...
Main Author: | Pathan, Al-Sakib Khan |
---|---|
Other Authors: | Sabu, Thampi M. |
Format: | Book Chapter |
Language: | English English English English |
Published: |
Chapman and Hall/CRC Press, USA
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/33636/1/K16388_C001_Corrected.pdf http://irep.iium.edu.my/33636/4/BookCover_Managing_Trust.pdf http://irep.iium.edu.my/33636/6/TOC_AnalyzingTrust%26Security.pdf http://irep.iium.edu.my/33636/9/AnalyzingTrust%26security_firstpage.pdf |
Similar Items
-
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014) -
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013) -
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013) -
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014) -
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)