International audienceTrust in computer science mostly relies on evaluating the risks of using a tool (software or hardware) or, more generally, any other form of digital service (i.e. a website). This evaluation and its reliability are all the more critical as stakes get higher: they are most important when dealing with an organisation's Information Systems Security (ISS). There are two main approaches to risk qualification. The older method regards products delivering ISS (software and hardware) and implementing security functions, and trust service providers (e.g. providing timestamps, signatures, electronic certificates). Often, public authorities are involved in the process of qualifying the level of risk. Here, trust is assumed to be ...
Simply by using information technology, consumers expose themselves to considerable security risks. ...
Service-orientation is effective at managing complexity and dynamicity at a programmatic level, but ...
Risk management is the process of risk identification, risk assessment and taking steps to reduce th...
The focus of the Information Systems (IS) research on trust has been on the perception of trust and ...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
M.Phil.The use of information systems has increased dramatically after the emergence of internet. In...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
AbstractHolistic assessment of cyber security risks is a complex multi-component and multi-level pro...
The need to assess the risks of the trustworthiness of counterparties is increasing every year. The ...
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
This work presents a model of trust as it relates to the management of informationtechnology (IT). W...
As e-commerce always suffers from the uncertainty, cheats and attacks, concepts of trust and risk ar...
Andrew Jones, 'Risk Management for Computer Security', (London; Butterworth-Heinemann, 2005), ISBN-1...
Open computing environments are under a deluge of network attacks from complex threats. These threat...
In this chapter we argue that transparency is worthless in guaranteeing the trustworthiness of the t...
Simply by using information technology, consumers expose themselves to considerable security risks. ...
Service-orientation is effective at managing complexity and dynamicity at a programmatic level, but ...
Risk management is the process of risk identification, risk assessment and taking steps to reduce th...
The focus of the Information Systems (IS) research on trust has been on the perception of trust and ...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
M.Phil.The use of information systems has increased dramatically after the emergence of internet. In...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
AbstractHolistic assessment of cyber security risks is a complex multi-component and multi-level pro...
The need to assess the risks of the trustworthiness of counterparties is increasing every year. The ...
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
This work presents a model of trust as it relates to the management of informationtechnology (IT). W...
As e-commerce always suffers from the uncertainty, cheats and attacks, concepts of trust and risk ar...
Andrew Jones, 'Risk Management for Computer Security', (London; Butterworth-Heinemann, 2005), ISBN-1...
Open computing environments are under a deluge of network attacks from complex threats. These threat...
In this chapter we argue that transparency is worthless in guaranteeing the trustworthiness of the t...
Simply by using information technology, consumers expose themselves to considerable security risks. ...
Service-orientation is effective at managing complexity and dynamicity at a programmatic level, but ...
Risk management is the process of risk identification, risk assessment and taking steps to reduce th...