Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

CHAPTER 1: INTRODUCTION
1.1 Towards Global Computing Systems
1.2 Security in Global Computing Systems
1.3 Trust Engines for Security in Global Computing
1.4 Aims and Objectives
1.5 Contribution of this Thesis
1.6 Organisation of this Thesis
2.1 Computer Security
2.2 Legacy Security is Challenged by Global Computing
2.3 Solving Security via Trust Engines in Global Computing
2.3.1 Inadequacy of Implicit Trust and Credential-based Trust
2.3.2 Collaborative Trust Computation to Bootstrap Trust in Strangers
2.4 Summary
CHAPTER 3: THE SECURE TRUST ENGINE
3.1 High-level View of the SECURE Trust Engine
3.3 Summary
4.1 Flawed Trust Engines due to Simple Identity Approach
4.1.1 Trust Metrics under Identity Usurpation and Multiplicity Attacks
4.1.2 The Sybil Attack
4.2 Remaining ASUP Issues due to Authentication
4.2.1 Naming Issues in Distributed and Collaborative Settings
4.2.2 Usability and Administrative Tasks at the Authentication Level
4.2.3 Adaptability of Authentication
4.3 Other Remaining Issues Relating to Privacy
4.3.1 Privacy Threats Introduced by Global Computing
4.3.2 Adaptability to Privacy Changes and their Usability Issues
4.4 Identity Terminology
4.5 Identity and Trust Frameworks Comparison
4.5.1 From Proven Related Legacy Frameworks to Pervasive Ones
4.5.2 Evidence-based Frameworks
4.5.3 Real-World Social Networks-based Frameworks
4.5.4 Peer-to-peer Frameworks
4.5.5 ASUP Qualitative Frameworks Comparison
4.6 Summary
CHAPTER 5: THE ENTIFICATION FRAMEWORK
5.1 Recognition rather than Authentication
5.2 The End-to-End Trust
5.3 Means for Recognition Adaptation
5.3.1 Pluggable Recognition Module: Recognised Virtual Identities Set
5.3.2 A Tuneable/Talkative ER Module
5.4 Encouraging Privacy and Still Supporting Trust
5.4.1 Encouraging the Use of Multiple Pseudonyms for Privacy’s Sake
5.4.2 Trading Privacy for Trust
5.5 Accuracy and Attack-Resistance of the Trust Values
5.5.1 Issues Surrounding Accurate Trustworthiness Assessment
5.5.2 Safe Fusionym
5.5.3 Trust Transfer to Mitigate Identity Multiplicity
5.6 Summary
CHAPTER 6: ENTIFICATION/ASUP TEST BED
6.1 Approximated Global Computing For ASUP Testing
6.2 Pure ER Scheme Experiment
6.3 Java-based Claim Tool Kit (CTK) Experiment
6.4.2 Trust value-based Email Prioritisation
6.4.3 A Real Social Network of Email Users
6.4.4 New Decentralised Anti-spoofing
6.5 Context-aware Privacy/Trust Trade Experiment
6.6 Vision-based Entity Recognition (VER) Experiment
6.7 Summary
CHAPTER 7: ENTIFICATION/ASUP EVALUATION
7.1 Evaluation Goals, Methodology and Hypotheses
7.2 Scalability of the Use of Recognition Clues
7.3 Demonstration of Static and Dynamic Technical Trust
7.3.1 AAS Technical Trust
7.3.2 Empirical Assessment of VER Technical Trust
7.3.3 Dynamic ER Technical Trust
7.4 ER Performance for Security Cost/Benefit Analysis
7.4.1 Ad-hoc Peer-to-Peer Performance/Security Trade-off Evaluation
7.4.2 CTK Performance and Cost/Benefit in Email Anti-spam
7.5 Viability of Pure ER Schemes via Threat Analysis
7.5.1 Adaptability, Security, Usability and Privacy Discussion
7.5.2 Defeating Profitable Attacks
7.5.3 Unprofitable Security Breach Attacks (SBA)
7.6 Mitigation of Identity Multiplicity Attacks
7.6.1 Behaviour Under Attack of A Real-Network of Email Users
7.6.2 Proof-of-Friends (PoF) and Trust Transfer
7.7 ASUP Qualitative Evaluation
7.8 Summary
CHAPTER 8: CONCLUSIONS AND FUTURE WORK
8.1 Achievements
8.2 Open Research Issues
BIBLIOGRAPHY
0 of .
Results for:
No results containing your search query
P. 1
Trust, Security and Privacy

Trust, Security and Privacy

Ratings: (0)|Views: 28 |Likes:
Published by Jagpreet Sidhu

More info:

Published by: Jagpreet Sidhu on Sep 29, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/10/2011

pdf

text

original

You're Reading a Free Preview
Pages 4 to 33 are not shown in this preview.
You're Reading a Free Preview
Pages 37 to 82 are not shown in this preview.
You're Reading a Free Preview
Pages 86 to 110 are not shown in this preview.
You're Reading a Free Preview
Pages 114 to 141 are not shown in this preview.
You're Reading a Free Preview
Pages 145 to 187 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->