Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Hrsg.: Ko, Ryan ; Choo, Kim-Kwang Raymond (2015)
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues
doi: 10.1016/B978-0-12-801595-7.00021-5
Buchkapitel, Bibliographie
Kurzbeschreibung (Abstract)
Abstract In this chapter, we provide an in-depth insight into computational trust methods that are able to reliably quantify the security level of service providers and transparently communicate that level to the users. The methods particularly consider business as well as end user requirements along with a complex specification of security assurances during security quantification. Novel trust methods are validated using formal proofs, industry-accepted security assurance datasets, and user studies.
Typ des Eintrags: | Buchkapitel |
---|---|
Erschienen: | 2015 |
Herausgeber: | Ko, Ryan ; Choo, Kim-Kwang Raymond |
Autor(en): | Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max |
Art des Eintrags: | Bibliographie |
Titel: | Computational trust methods for security quantification in the cloud ecosystem |
Sprache: | Englisch |
Publikationsjahr: | Juni 2015 |
Ort: | Amsterdam Heidelberg |
Verlag: | Elsevier Syngress |
Titel der Zeitschrift, Zeitung oder Schriftenreihe: | The Cloud Security Ecosystem |
Buchtitel: | The cloud security ecosystem : technical, legal, business and management issues |
Veranstaltungsort: | Boston, USA |
DOI: | 10.1016/B978-0-12-801595-7.00021-5 |
Kurzbeschreibung (Abstract): | Abstract In this chapter, we provide an in-depth insight into computational trust methods that are able to reliably quantify the security level of service providers and transparently communicate that level to the users. The methods particularly consider business as well as end user requirements along with a complex specification of security assurances during security quantification. Novel trust methods are validated using formal proofs, industry-accepted security assurance datasets, and user studies. |
Freie Schlagworte: | Solutions;S1;Computational trust, Security, Quantification, CertainLogic, Cloud computing |
ID-Nummer: | TUD-CS-2015-0116 |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Telekooperation DFG-Sonderforschungsbereiche (inkl. Transregio) DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche Profilbereiche Profilbereiche > Cybersicherheit (CYSEC) LOEWE LOEWE > LOEWE-Zentren LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen |
Hinterlegungsdatum: | 15 Nov 2016 23:15 |
Letzte Änderung: | 14 Jun 2021 06:14 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |