Research Commons
      • Browse 
        • Communities & Collections
        • Titles
        • Authors
        • By Issue Date
        • Subjects
        • Types
        • Series
      • Help 
        • About
        • Collection Policy
        • OA Mandate Guidelines
        • Guidelines FAQ
        • Contact Us
      • My Account 
        • Sign In
        • Register
      View Item 
      •   Research Commons
      • University of Waikato Research
      • Computing and Mathematical Sciences
      • Computing and Mathematical Sciences Papers
      • View Item
      •   Research Commons
      • University of Waikato Research
      • Computing and Mathematical Sciences
      • Computing and Mathematical Sciences Papers
      • View Item
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      Digital trust - trusted computing and beyond: A position paper

      Akram, Raja Naeem; Ko, Ryan K.L.
      Thumbnail
      Files
      Digital Trust - Trusted Computing and Beyond A Position Paper.pdf
      Accepted version, 813.9Kb
      DOI
       10.1109/TrustCom.2014.116
      Find in your library  
      Citation
      Export citation
      Akram, R. N., & Ko, R. K. L. (2015). Digital trust - trusted computing and beyond: A position paper. In Proceedings 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 884–892). New York, USA: Institute of Electrical and Electronics Engineers Inc. http://doi.org/10.1109/TrustCom.2014.116
      Permanent Research Commons link: https://hdl.handle.net/10289/9281
      Abstract
      Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust (established in the real world) in the organisation/individual that manages the digital resources. This concept evolved to deal with the rapid growth of the Internet, where it became impractical for entities to have prior offline (real world) trust. The evolution of digital trust took diverse approaches and now trust is defined and understood differently across heterogeneous domains. This paper looks at digital trust from the point of view of security and examines how valid trust approaches from other domains are now making their way into secure computing. The paper also revisits and analyses the Trusted Platform Module (TPM) along with associated technologies and their relevance in the changing landscape. We especially focus on the domains of cloud computing, mobile computing and cyber-physical systems. In addition, the paper also explores our proposals that are competing with and extending the traditional functionality of TPM specifications.
      Date
      2015-01-15
      Type
      Conference Contribution
      Publisher
      IEEE Computer Society
      Rights
      This is author's accept version of an article published in Proceedings of 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
      Collections
      • Computing and Mathematical Sciences Papers [1455]
      Show full item record  

      Usage

      Downloads, last 12 months
      106
       
       
       

      Usage Statistics

      For this itemFor all of Research Commons

      The University of Waikato - Te Whare Wānanga o WaikatoFeedback and RequestsCopyright and Legal Statement