TU Darmstadt / ULB / TUbiblio

Computational trust methods for security quantification in the cloud ecosystem

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: nicht bekannt Syngress Boston, USA , S. 463-493. ISBN 978-0-12-801595-7
[Buchkapitel] , (2015)

Kurzbeschreibung (Abstract)

<span style="color: rgb(51, 51, 51); font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none; ">In this chapter, we provide an in-depth insight into computational trust methods that are able to reliably quantify the security level of service providers and transparently communicate that level to the users. The methods particularly consider business as well as end user requirements along with a complex specification of security assurances during security quantification. Novel trust methods are validated using formal proofs, industry-accepted security assurance datasets, and user studies.</span>

Typ des Eintrags: Buchkapitel
Erschienen: 2015
Autor(en): Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Titel: Computational trust methods for security quantification in the cloud ecosystem
Sprache: Englisch
Kurzbeschreibung (Abstract):

<span style="color: rgb(51, 51, 51); font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none; ">In this chapter, we provide an in-depth insight into computational trust methods that are able to reliably quantify the security level of service providers and transparently communicate that level to the users. The methods particularly consider business as well as end user requirements along with a complex specification of security assurances during security quantification. Novel trust methods are validated using formal proofs, industry-accepted security assurance datasets, and user studies.</span>

Verlag: Syngress
Freie Schlagworte: S1;Solutions;SPIN: Smart Protection in Infrastructures and Networks;Computational trust, Security, Quantification, CertainLogic, Cloud computing
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Telekooperation
DFG-Sonderforschungsbereiche (inkl. Transregio)
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen
Veranstaltungsort: Boston, USA
Hinterlegungsdatum: 06 Sep 2017 13:25
DOI: 10.1016/B978-0-12-801595-7.00021-5
ID-Nummer: TUD-CS-2015-12105
Export:

Optionen (nur für Redakteure)

Eintrag anzeigen Eintrag anzeigen