TAILIEUCHUNG - Computer Security: Chapter 4 - Introduction to Trust in Computing

Computer Security: Chapter 4 - Introduction to Trust in Computing presents about Trust in Social & Computing Systems, Selected Trust Characteristics, Selected Research Issues in Trust, Avoiding Traps of Trust Complexity, Trust and Privacy, Trust & Pervasive Computing. | 4. Introduction to Trust in Computing* Presented by: Prof. Bharat Bhargava Department of Computer Sciences and Center for Education and Research in Information Assurance and Security (CERIAS) Purdue University with contributions from Prof. Leszek Lilien Western Michigan University and CERIAS, Purdue University * Supported in part by NSF grants IIS-0209059, IIS-0242840, ANI-0219110, and Cisco URP grant. Introduction to Trust Outline 1) Trust in Social & Computing Systems 2) Selected Trust Characteristics 3) Selected Research Issues in Trust 4) Avoiding Traps of Trust Complexity 5) Trust and Privacy incl. Trading Privacy Loss for Trust Gain 6) Trust & Pervasive Computing 3/23/04 1) Trust in Social & Comput’g Systems (1) Trust [The American Heritage Dictionary of the English Language, 4th ed., Houghton Mifflin, 2000 ] = “reliance on the integrity, ability, or character of a person or thing” Trust is pervasive in social systems Constantly used it in interactions among: People / Organizations / Animals / Artifacts (sic!) ., “Can I trust my car on this long vacation trip?” Used instinctively and implicitly in closed and static systems Example: In a small village – everybody knows everybody Villagers instinctively use their knowledge or stereotypes to trust/distrust others Used consciously and explicitly in open or dynamic systems Example: In a big city - explicit rules of behavior in diverse trust relationships ., Build up trust by asking friends or recommendation services for a dependable plumber 3/23/04 1) Trust in Social & Computing Systems (2) Establishing Trust by Interactions Social or computer-based interactions: From a simple transaction to a complex collaboration Adequate degree of trust required for interactions How to establish initial trust? Build up trust in interactions with strangers or known partners Human or artificial partners Offline or online Trust Degradation and Recovery Identification and isolation of violators Dynamic trust updated

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.