Skip to main content

Hardware Security Appliances for Trust

  • Conference paper
  • First Online:
Trust Management (iTrust 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2692))

Included in the following conference series:

Abstract

This paper looks at the trust relationships that exist within an outsourcing scenario finding that whilst some of the trust relationships are clear other implicit trust relationships need exposing. These implicit trust relationships are often a result of information supplied for the main explicit task for which an entity is being trusted. The use of hardware security appliance based services is proposed allowing trust to be dissipated over multiple parties whilst retaining efficient execution. Such an approach helps mitigate these implicit trust relationships by increasing the control and transparency given to the trustor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Castelfranchi, C. & Yao-Hua Tan: Why Trust and Deception are Essential for Virtual Societies. In Castelfranchi C. & Yao-Hua Tan (Eds): Introduction to Trust and Deception in Virtual Societies. Kluwer Academic Publishers 2001.

    Google Scholar 

  2. Jong Kim, Y. Il Song, D., Braynov, S.B., Raghav Rao, H.: A B-to-C Trust Model for Online Exchange. In Americas Conference on Information Systems, pp 784–787 Boston 2001

    Google Scholar 

  3. EC: Open Access to Electronic Commerce for European Small and Medium Size Companies. Memorandum of Understanding, European Commission, DG-XIII-B, 1999

    Google Scholar 

  4. Abdul-Rahman A., Hailes S.: A Distributed Trust Model. In Proceedings of the 1997 New Security Paradigms Workshop. Pages 48–60

    Google Scholar 

  5. Grandison, T., & Sloman, M.: SULTAN — A Language of Trust Specification and Analysis. 8th Workshop of the HP Openview University association. 2001 http://www.hpovua.org

  6. Baldwin, A., Shiu, S.: Encryption and Key Management in a SAN, In Proceedings First IEEE International Security in Storage Workshop, Maryland, December 2002

    Google Scholar 

  7. Bailey, T.: The Philosophy of Trust (response to 2002 Reith Lecture) http://www.open2.net/trust/on_trust/on_trust1.htm

  8. O’Neill O,: Question of Trust: BBC Reith Lectures 2002. Cambridge University Press 2002 http://www.bbc.co.uk/radio4/reith2002/

  9. Blaze, M., Feigenbaum, J., Lacy J.: Decentralized Trust Management. In Proceedings of IEEE Conference on Security and Privacy 1996. http://www.crypto.com/papers/policymaker.pdf

  10. Josang, A., Tran, N.: Trust Management for E-Commerce. In Proceedings Virtual Banking 2000. http://195.13.121.137/virtualbanking2000/index.htm

  11. Turner, V. Utility Data Center: HPs first proof point for service centric computing. 2001 http://www.hp.com/solutions1/infrastructure/infolibrary/idcwhitepaper.pdf

  12. Baldwin, A., Shiu, S., Casassa Mont, M.: Trust Services: A Framework for Service based Solutions, In proceedings of the 26th IEEE Computer Software and Applications Conference (COMPSAC), Oxford UK, 2002

    Google Scholar 

  13. Fips: Security Requirements for cryptographic modules. Fips 140-2 2001 http://csrc.ncsl.nist.gov/publications/fips/fips140-1/fips1402.pdf

  14. Attalla: Atalla Security Products (HP) http://atalla.inet.cpqcorp.net

  15. Casassa Mont, M, Baldwin, A., Goh., C.: Power Prototype: Towards integrated policy based management. In Hong, J., Weihmayer R. (eds): Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2000), Hawaii May 2000, pp 789–802

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Baldwin, A., Shiu, S. (2003). Hardware Security Appliances for Trust. In: Nixon, P., Terzis, S. (eds) Trust Management. iTrust 2003. Lecture Notes in Computer Science, vol 2692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44875-6_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-44875-6_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40224-4

  • Online ISBN: 978-3-540-44875-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics