http://iet.metastore.ingenta.com
1887

A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges

A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges

For access to this article, please select a purchase option:

Buy chapter PDF
$16.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Security and Privacy for Big Data, Cloud Computing and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

With the fast development of large-scale Internet-based systems and their penetration into every human life activity, trust, trustworthiness and trustworthy computing have become cross-cutting features of all such systems being business, e-commerce, social networking, collaborative systems, etc. Indeed, users'activity in Internet-based systems each time raises more concerns of trust while interacting through and with such systems. The expectations of users, clients, costumers as well as of the communication and collaboration at large scale are based on the premise of trust as a cornerstone of secure, reliable, privacy preserving and integrity of Internet-based systems. While trust and security go hand-by-hand, trust however is very much related to users' experiences and perceptions on system's performance, reliability and privacy. Unfortunately, many recent cases from development of large-scale systems, especially from social networking and from big corporates, have shown important breaches and vulnerabilities causing a devastating effect on users' trust. In this chapter, we survey most relevant concepts and models for trust, trustworthiness and trustworthy computing and discuss their various forms in business, e-commerce, social networking, etc. We identify main factors that determine trust, trustworthiness and trustworthy computing as well as major research challenges in the field. We also briefly discuss how Blockchain is shaping trust in new Internet-based systems. Current efforts by research community to address them are discussed and new research directions envisaged.

Chapter Contents:

  • 9.1 Introduction
  • 9.2 Basic concepts and models for trust, trustworthiness and trustworthy computing
  • 9.2.1 Characteristics of trust, trustworthiness and trustworthy computing
  • 9.2.2 Trust, trustworthy and trustworthiness modelling
  • 9.2.2.1 Trust model for collaboration in virtual campuses
  • 9.2.2.2 Trust model for social networking
  • 9.2.2.3 Trust model for IoT, MANETs andVANETs
  • 9.2.2.4 The inherent limitations of trust models
  • 9.3 Trustworthy evaluation and prediction
  • 9.4 Blockchain and trust
  • 9.4.1 Trust-free vs. trust building
  • 9.4.2 Blockchain as a factor of trust
  • 9.5 Conclusions and future research
  • References

Inspec keywords: electronic commerce; trusted computing; data privacy; social networking (online); security of data; Internet; cryptocurrencies

Other keywords: collaborative systems; trustworthiness; large-scale Internet-based systems; Blockchain; e-commerce; large-scale systems; trustworthy computing; social networking

Subjects: Financial computing; Information networks; Data security

Preview this chapter:
Zoom in
Zoomout

A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch9-1.gif /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch9-2.gif

Related content

content/books/10.1049/pbpc028e_ch9
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address