We investigate how the term 'trust' has been used, and re-defined, in computer security, covering Trusted Computing Platforms, Trust Management, Trusted Computing, and Trusted Code. We conclude that trust is a dangerous word to use as it has manifold and sometimes contradictory meanings. There is no immediate problem when trust is used in a specific research area to denote some concept of interest. Difficulties arise when interfacing between communities that use this word differently, and with the general public which is unlikely to associate a word like trust with any specific technical definition adopted in a field of research. © 2006 Elsevier B.V. All rights reserved
Chugh, R ORCiD: 0000-0003-0061-7206The threat profile of spyware is increasing rapidly when we consi...
The concepts, Trust, Risk, Privacy and Security, are widely used in various studies done by multiple...
Abstract. A large amount of research attempts to define trust, yet rela-tively little research attem...
AbstractWe investigate how the term 'trust' has been used, and re-defined, in computer security, cov...
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
The word for comp uter security is used commonly , but the content of a computer can be weak...
Trust is an integral component in many kinds of human interaction, allowing people to act under unce...
Security, are widely used in various studies done by multiple disciplines, and they are often incorr...
In these uncertain economic times, two key ingredients which are in short supply are trust and confi...
In this work we survey the findings in social psychology and philosophy with respect to trust. We in...
Open computing environments are under a deluge of network attacks from complex threats. These threat...
In innovation, trust is especially needed as well as especially problematic. One needs trust under u...
International audienceTrust in computer science mostly relies on evaluating the risks of using a too...
Scholarly research largely converges on the argument that trust is of paramount importance to drive ...
In the literature, there is a lot of confusion regarding the relationship between the 'trust' and 's...
Chugh, R ORCiD: 0000-0003-0061-7206The threat profile of spyware is increasing rapidly when we consi...
The concepts, Trust, Risk, Privacy and Security, are widely used in various studies done by multiple...
Abstract. A large amount of research attempts to define trust, yet rela-tively little research attem...
AbstractWe investigate how the term 'trust' has been used, and re-defined, in computer security, cov...
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
The word for comp uter security is used commonly , but the content of a computer can be weak...
Trust is an integral component in many kinds of human interaction, allowing people to act under unce...
Security, are widely used in various studies done by multiple disciplines, and they are often incorr...
In these uncertain economic times, two key ingredients which are in short supply are trust and confi...
In this work we survey the findings in social psychology and philosophy with respect to trust. We in...
Open computing environments are under a deluge of network attacks from complex threats. These threat...
In innovation, trust is especially needed as well as especially problematic. One needs trust under u...
International audienceTrust in computer science mostly relies on evaluating the risks of using a too...
Scholarly research largely converges on the argument that trust is of paramount importance to drive ...
In the literature, there is a lot of confusion regarding the relationship between the 'trust' and 's...
Chugh, R ORCiD: 0000-0003-0061-7206The threat profile of spyware is increasing rapidly when we consi...
The concepts, Trust, Risk, Privacy and Security, are widely used in various studies done by multiple...
Abstract. A large amount of research attempts to define trust, yet rela-tively little research attem...