Trust, Computing, and Society

Trust, Computing, and Society

Author: Richard H. R. Harper

Publisher: Cambridge University Press

Published: 2014-02-28

Total Pages: 375

ISBN-13: 110778302X

DOWNLOAD EBOOK

The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust.


Computing with Social Trust

Computing with Social Trust

Author: Jennifer Golbeck

Publisher: Springer Science & Business Media

Published: 2008-11-16

Total Pages: 335

ISBN-13: 1848003560

DOWNLOAD EBOOK

This book has evolved out of roughly ve years of working on computing with social trust. In the beginning, getting people to accept that social networks and the relationships in them could be the basis for interesting, relevant, and exciting c- puter science was a struggle. Today, social networking and social computing have become hot topics, and those of us doing research in this space are nally nding a wealth of opportunities to share our work and to collaborate with others. This book is a collection of chapters that cover all the major areas of research in this space. I hope it will serve as a guide to students and researchers who want a strong introduction to work in the eld, and as encouragement and direction for those who are considering bringing their own techniques to bear on some of these problems. It has been an honor and privilege to work with these authors for whom I have so much respect and admiration. Thanks to all of them for their outstanding work, which speaks for itself, and for patiently enduringall my emails. Thanks, as always, to Jim Hendler for his constant support. Cai Ziegler has been particularly helpful, both as a collaborator, and in the early stages of development for this book. My appreciation also goes to Beverley Ford, Rebecca Mowat and everyone at Springer who helped with publication of this work.


Trust in Computer Systems and the Cloud

Trust in Computer Systems and the Cloud

Author: Mike Bursell

Publisher: John Wiley & Sons

Published: 2021-10-25

Total Pages: 352

ISBN-13: 1119692318

DOWNLOAD EBOOK

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security.


Trusted Computing Platforms

Trusted Computing Platforms

Author: Siani Pearson

Publisher: Prentice Hall Professional

Published: 2003

Total Pages: 358

ISBN-13: 9780130092205

DOWNLOAD EBOOK

The TCPA 1.0 specification finally makes it possible to build low-cost computing platforms on a rock-solid foundation of trust. In Trusted Computing Platforms, leaders of the TCPA initiative place it in context, offering essential guidance for every systems developer and decision-maker. They explain what trusted computing platforms are, how they work, what applications they enable, and how TCPA can be used to protect data, software environments, and user privacy alike.


Liars and Outliers

Liars and Outliers

Author: Bruce Schneier

Publisher: John Wiley & Sons

Published: 2012-01-27

Total Pages: 387

ISBN-13: 1118239016

DOWNLOAD EBOOK

In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. In this insightful and entertaining book, Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows the unique role of trust in facilitating and stabilizing human society. He discusses why and how trust has evolved, why it works the way it does, and the ways the information society is changing everything.


Computers and Society

Computers and Society

Author: Ronald M. Baecker

Publisher:

Published: 2019

Total Pages: 549

ISBN-13: 0198827083

DOWNLOAD EBOOK

Computers and Society explores the history and impact of modern technology on everyday human life, considering its benefits, drawbacks, and repercussions. Particular attention is paid to new developments in artificial intelligence and machine learning, and the issues that have arisen from our complex relationship with AI.


Computers and Society

Computers and Society

Author: Lisa C. Kaczmarczyk

Publisher: CRC Press

Published: 2016-04-19

Total Pages: 309

ISBN-13: 1439885567

DOWNLOAD EBOOK

Since computer scientists make decisions every day that have societal context and influence, an understanding of society and computing together should be integrated into computer science education. Showing students what they can do with their computing degree, Computers and Society: Computing for Good uses concrete examples and case studies to high


Autonomic and Trusted Computing

Autonomic and Trusted Computing

Author: Juan González Nieto

Publisher: Springer Science & Business Media

Published: 2009-06-22

Total Pages: 280

ISBN-13: 3642027032

DOWNLOAD EBOOK

This book constitutes the refereed procedings of the 6th International Conference on Autonomic and Trusted Computing, ATC 2009, held in Brisbane, Australia, in July 2009, co-located with UIC 2009, the 6th International Conference on Ubiquitous Intelligence and Computing. The 17 revised full papers presented together with one invited paper and one keynote talk were carefully reviewed and selected from 52 submissions. The regular papers are organized in topical sections on organic and autonomic computing, trusted computing, wireless sensor networks, and trust.


Mechanizing Proof

Mechanizing Proof

Author: Donald MacKenzie

Publisher: MIT Press

Published: 2004-01-30

Total Pages: 448

ISBN-13: 9780262632959

DOWNLOAD EBOOK

Most aspects of our private and social lives—our safety, the integrity of the financial system, the functioning of utilities and other services, and national security—now depend on computing. But how can we know that this computing is trustworthy? In Mechanizing Proof, Donald MacKenzie addresses this key issue by investigating the interrelations of computing, risk, and mathematical proof over the last half century from the perspectives of history and sociology. His discussion draws on the technical literature of computer science and artificial intelligence and on extensive interviews with participants. MacKenzie argues that our culture now contains two ideals of proof: proof as traditionally conducted by human mathematicians, and formal, mechanized proof. He describes the systems constructed by those committed to the latter ideal and the many questions those systems raise about the nature of proof. He looks at the primary social influence on the development of automated proof—the need to predict the behavior of the computer systems upon which human life and security depend—and explores the involvement of powerful organizations such as the National Security Agency. He concludes that in mechanizing proof, and in pursuing dependable computer systems, we do not obviate the need for trust in our collective human judgment.


Trust and Trustworthy Computing

Trust and Trustworthy Computing

Author: Michael Huth

Publisher: Springer

Published: 2013-06-12

Total Pages: 290

ISBN-13: 3642389082

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.