O'Reilly logo

The Cloud Security Ecosystem by Raymond Choo, Ryan Ko

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 21

Computational trust methods for security quantification in the cloud ecosystem

Sheikh Mahbub Habib; Florian Volk; Sascha Hauke; Max Mühlhäuser    Telecooperation Lab, Technische Universität Darmstadt/CASED, Darmstadt, Germany

Abstract

In this chapter, we provide an in-depth insight into computational trust methods that are able to reliably quantify the security level of service providers and transparently communicate that level to the users. The methods particularly consider business as well as end user requirements along with a complex specification of security assurances during security quantification. Novel trust methods are validated using formal proofs, industry-accepted security assurance datasets, and user studies.

Keywords ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required