On the Boundaries of Trust and Security in Computing and Communications Systems

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Not copyrighted, own version manuscript to be published in IJTMCC, Inderscience, 5 pages in single column single space, 12 fon

Scientific paper

This article analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the other hand, security is about making sure that the participating entities are legitimate in a communication event or incident so that the core requirements of privacy, integrity, and authenticity are maintained. This notion is also true for our human life, even for example entering a house needs legitimacy of a person. Some boundary lines preserve the security; otherwise an unwanted access is called a 'security breach'. The intent of this article is to compare and discuss these two terms with our societal behavior and understanding amongst entities. To illustrate these issues especially in computing and communications world, some of the innovating and recent technologies are discussed which demand trust and security within their core operational structures. Alongside presenting generally established ideas, some critical points are mentioned that may be sometimes debatable within the research community.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

On the Boundaries of Trust and Security in Computing and Communications Systems does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with On the Boundaries of Trust and Security in Computing and Communications Systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and On the Boundaries of Trust and Security in Computing and Communications Systems will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-487760

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.