Editorial article: on the boundaries of trust and security in computing and communications systems
This article analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the...
| Main Author: | Pathan, Al-Sakib Khan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Inderscience Publishers
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/8462/ http://irep.iium.edu.my/8462/1/IJTMCC020100_PATHAN.pdf |
Similar Items
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
Editorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
Security mechanisms and data access protocols in innovative wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
An enhanced tree-based key management scheme for secure communication in wireless sensor network
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Security wireless sensor networks: prospects, challenges, and future
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Energy-efficient secure routing in heavily deployed wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013)
by: Gündüz, Feyza, et al.
Published: (2013)
Usability improvements for touch-screen mobile flight booking application: a case study
by: Gündüz, Feyza, et al.
Published: (2012)
by: Gündüz, Feyza, et al.
Published: (2012)
Technological impact on disaster management information system
by: Islam, Humayun Kadir, et al.
Published: (2004)
by: Islam, Humayun Kadir, et al.
Published: (2004)
Multi-dimensional networking and distributed computing services
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Learning Qur’anic Arabic through interactive Web-based software: a pragmatic approach in language for specific purpose
by: Abdullah, Matin Saad, et al.
Published: (2013)
by: Abdullah, Matin Saad, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Embedded processor security
by: d'Auriol, Brian J., et al.
Published: (2007)
by: d'Auriol, Brian J., et al.
Published: (2007)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Guest editorial: Special issue on integration of IoT with future Internet
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Secure clustering in DSN with key predistribution and WCDS
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
A secure energy-efficient routing protocol for WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Editorial: Wireless sensor networks based on environmental energy harvesting
by: Han, Guangjie, et al.
Published: (2013)
by: Han, Guangjie, et al.
Published: (2013)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A secure and efficient way of node membership verification in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services An Extension of TAM
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
Visual computer: guest editorial
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
Using the web for critical learning of al-Qur’an’s language: an exploratory case study
by: Abdullah, Matin Saad, et al.
Published: (2012)
by: Abdullah, Matin Saad, et al.
Published: (2012)
Similar Items
-
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013) -
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013) -
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015) -
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013) -
Editorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)