TU Darmstadt / ULB / TUbiblio

Computational trust methods for security quantification in the cloud ecosystem

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
eds.: Ko, Ryan ; Choo, Kim-Kwang Raymond (2015)
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues
doi: 10.1016/B978-0-12-801595-7.00021-5
Book Section, Bibliographie

Abstract

Abstract In this chapter, we provide an in-depth insight into computational trust methods that are able to reliably quantify the security level of service providers and transparently communicate that level to the users. The methods particularly consider business as well as end user requirements along with a complex specification of security assurances during security quantification. Novel trust methods are validated using formal proofs, industry-accepted security assurance datasets, and user studies.

Item Type: Book Section
Erschienen: 2015
Editors: Ko, Ryan ; Choo, Kim-Kwang Raymond
Creators: Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Type of entry: Bibliographie
Title: Computational trust methods for security quantification in the cloud ecosystem
Language: English
Date: June 2015
Place of Publication: Amsterdam Heidelberg
Publisher: Elsevier Syngress
Journal or Publication Title: The Cloud Security Ecosystem
Book Title: The cloud security ecosystem : technical, legal, business and management issues
Event Location: Boston, USA
DOI: 10.1016/B978-0-12-801595-7.00021-5
Abstract:

Abstract In this chapter, we provide an in-depth insight into computational trust methods that are able to reliably quantify the security level of service providers and transparently communicate that level to the users. The methods particularly consider business as well as end user requirements along with a complex specification of security assurances during security quantification. Novel trust methods are validated using formal proofs, industry-accepted security assurance datasets, and user studies.

Uncontrolled Keywords: Solutions;S1;Computational trust, Security, Quantification, CertainLogic, Cloud computing
Identification Number: TUD-CS-2015-0116
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Telecooperation
DFG-Collaborative Research Centres (incl. Transregio)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments
Date Deposited: 15 Nov 2016 23:15
Last Modified: 14 Jun 2021 06:14
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details