Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
eds.: Ko, Ryan ; Choo, Kim-Kwang Raymond (2015)
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues
doi: 10.1016/B978-0-12-801595-7.00021-5
Book Section, Bibliographie
Abstract
Abstract In this chapter, we provide an in-depth insight into computational trust methods that are able to reliably quantify the security level of service providers and transparently communicate that level to the users. The methods particularly consider business as well as end user requirements along with a complex specification of security assurances during security quantification. Novel trust methods are validated using formal proofs, industry-accepted security assurance datasets, and user studies.
Item Type: | Book Section |
---|---|
Erschienen: | 2015 |
Editors: | Ko, Ryan ; Choo, Kim-Kwang Raymond |
Creators: | Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max |
Type of entry: | Bibliographie |
Title: | Computational trust methods for security quantification in the cloud ecosystem |
Language: | English |
Date: | June 2015 |
Place of Publication: | Amsterdam Heidelberg |
Publisher: | Elsevier Syngress |
Journal or Publication Title: | The Cloud Security Ecosystem |
Book Title: | The cloud security ecosystem : technical, legal, business and management issues |
Event Location: | Boston, USA |
DOI: | 10.1016/B978-0-12-801595-7.00021-5 |
Abstract: | Abstract In this chapter, we provide an in-depth insight into computational trust methods that are able to reliably quantify the security level of service providers and transparently communicate that level to the users. The methods particularly consider business as well as end user requirements along with a complex specification of security assurances during security quantification. Novel trust methods are validated using formal proofs, industry-accepted security assurance datasets, and user studies. |
Uncontrolled Keywords: | Solutions;S1;Computational trust, Security, Quantification, CertainLogic, Cloud computing |
Identification Number: | TUD-CS-2015-0116 |
Divisions: | 20 Department of Computer Science 20 Department of Computer Science > Telecooperation DFG-Collaborative Research Centres (incl. Transregio) DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres Profile Areas Profile Areas > Cybersecurity (CYSEC) LOEWE LOEWE > LOEWE-Zentren LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments |
Date Deposited: | 15 Nov 2016 23:15 |
Last Modified: | 14 Jun 2021 06:14 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Send an inquiry |
Options (only for editors)
Show editorial Details |