Abstract
This paper looks at the trust relationships that exist within an outsourcing scenario finding that whilst some of the trust relationships are clear other implicit trust relationships need exposing. These implicit trust relationships are often a result of information supplied for the main explicit task for which an entity is being trusted. The use of hardware security appliance based services is proposed allowing trust to be dissipated over multiple parties whilst retaining efficient execution. Such an approach helps mitigate these implicit trust relationships by increasing the control and transparency given to the trustor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Castelfranchi, C. & Yao-Hua Tan: Why Trust and Deception are Essential for Virtual Societies. In Castelfranchi C. & Yao-Hua Tan (Eds): Introduction to Trust and Deception in Virtual Societies. Kluwer Academic Publishers 2001.
Jong Kim, Y. Il Song, D., Braynov, S.B., Raghav Rao, H.: A B-to-C Trust Model for Online Exchange. In Americas Conference on Information Systems, pp 784–787 Boston 2001
EC: Open Access to Electronic Commerce for European Small and Medium Size Companies. Memorandum of Understanding, European Commission, DG-XIII-B, 1999
Abdul-Rahman A., Hailes S.: A Distributed Trust Model. In Proceedings of the 1997 New Security Paradigms Workshop. Pages 48–60
Grandison, T., & Sloman, M.: SULTAN — A Language of Trust Specification and Analysis. 8th Workshop of the HP Openview University association. 2001 http://www.hpovua.org
Baldwin, A., Shiu, S.: Encryption and Key Management in a SAN, In Proceedings First IEEE International Security in Storage Workshop, Maryland, December 2002
Bailey, T.: The Philosophy of Trust (response to 2002 Reith Lecture) http://www.open2.net/trust/on_trust/on_trust1.htm
O’Neill O,: Question of Trust: BBC Reith Lectures 2002. Cambridge University Press 2002 http://www.bbc.co.uk/radio4/reith2002/
Blaze, M., Feigenbaum, J., Lacy J.: Decentralized Trust Management. In Proceedings of IEEE Conference on Security and Privacy 1996. http://www.crypto.com/papers/policymaker.pdf
Josang, A., Tran, N.: Trust Management for E-Commerce. In Proceedings Virtual Banking 2000. http://195.13.121.137/virtualbanking2000/index.htm
Turner, V. Utility Data Center: HPs first proof point for service centric computing. 2001 http://www.hp.com/solutions1/infrastructure/infolibrary/idcwhitepaper.pdf
Baldwin, A., Shiu, S., Casassa Mont, M.: Trust Services: A Framework for Service based Solutions, In proceedings of the 26th IEEE Computer Software and Applications Conference (COMPSAC), Oxford UK, 2002
Fips: Security Requirements for cryptographic modules. Fips 140-2 2001 http://csrc.ncsl.nist.gov/publications/fips/fips140-1/fips1402.pdf
Attalla: Atalla Security Products (HP) http://atalla.inet.cpqcorp.net
Casassa Mont, M, Baldwin, A., Goh., C.: Power Prototype: Towards integrated policy based management. In Hong, J., Weihmayer R. (eds): Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2000), Hawaii May 2000, pp 789–802
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Baldwin, A., Shiu, S. (2003). Hardware Security Appliances for Trust. In: Nixon, P., Terzis, S. (eds) Trust Management. iTrust 2003. Lecture Notes in Computer Science, vol 2692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44875-6_4
Download citation
DOI: https://doi.org/10.1007/3-540-44875-6_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40224-4
Online ISBN: 978-3-540-44875-4
eBook Packages: Springer Book Archive