Trust in Computer Systems and the Cloud. Mike Bursell. Читать онлайн. Newlib. NEWLIB.NET

Автор: Mike Bursell
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная компьютерная литература
Год издания: 0
isbn: 9781119692317
Скачать книгу
f-26dd-5364-8053-ad97567f9a89">

      

      Table of Contents

      1  Cover

      2  Praise for Trust in Computer Systems and the Cloud

      3  Title Page

      4  Introduction Notes

      5  CHAPTER 1: Why Trust? Analysing Our Trust Statements What Is Trust? What Is Agency? Trust and Security Trust as a Way for Humans to Manage Risk Risk, Trust, and Computing Notes

      6  CHAPTER 2: Humans and Trust The Role of Monitoring and Reporting in Creating Trust Game Theory Institutional Trust Trust Based on Authority Trusting Individuals The Dangers of Anthropomorphism Identifying the Real Trustee Notes

      7  CHAPTER 3: Trust Operations and Alternatives Trust Actors, Operations, and Components Assurance and Accountability Notes

      8  CHAPTER 4: Defining Trust in Computing A Survey of Trust Definitions in Computer Systems Applying Socio-Philosophical Definitions of Trust to Systems Notes

      9  CHAPTER 5: The Importance of Systems System Design “Trusted” Systems Hardware Root of Trust The Importance of Systems Worked Example: Purchasing Whisky The Importance of Being Explicit Notes

      10  CHAPTER 6: Blockchain and Trust Bitcoin and Other Blockchains Permissioned Blockchains Permissionless Blockchains and Cryptocurrencies Notes

      11  CHAPTER 7: The Importance of Time Decay of Trust Trusted Computing Base Notes

      12  CHAPTER 8: Systems and Trust System Components Explicit Behaviour Time and Systems Defining System Boundaries Notes

      13  CHAPTER 9: Open Source and Trust Distributed Trust How Open Source Relates to Trust Notes

      14  CHAPTER 10: Trust, the Cloud, and the Edge Deployment Model Differences Mutually Adversarial Computing Mitigations and Their Efficacy Notes

      15  CHAPTER 11: Hardware, Trust, and Confidential Computing Properties of Hardware and Trust Physical Compromise Confidential Computing Notes

      16  CHAPTER 12: Trust Domains The Composition of Trust Domains Trust Domain Primitives and Boundaries Notes

      17  CHAPTER