Home > Computing and Information Technology > Computer science > Trust in Computer Systems and the Cloud
46%
Trust in Computer Systems and the Cloud

Trust in Computer Systems and the Cloud

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity  Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing.  The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security.  Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals  A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs.  A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring  Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security. 

Table of Contents:
Introduction xv Chapter 1 Why Trust? 1 Analysing Our Trust Statements 4 What Is Trust? 5 What Is Agency? 8 Trust and Security 10 Trust as a Way for Humans to Manage Risk 13 Risk, Trust, and Computing 15 Defining Trust in Systems 15 Defining Correctness in System Behaviour 17 Chapter 2 Humans and Trust 19 The Role of Monitoring and Reporting in Creating Trust 21 Game Theory 24 The Prisoner’s Dilemma 24 Reputation and Generalised Trust 27 Institutional Trust 28 Theories of Institutional Trust 29 Who Is Actually Being Trusted? 31 Trust Based on Authority 33 Trusting Individuals 37 Trusting Ourselves 37 Trusting Others 41 Trust, But Verify 43 Attacks from Within 43 The Dangers of Anthropomorphism 45 Identifying the Real Trustee 47 Chapter 3 Trust Operations and Alternatives 53 Trust Actors, Operations, and Components 53 Reputation, Transitive Trust, and Distributed Trust 59 Agency and Intentionality 62 Alternatives to Trust 65 Legal Contracts 65 Enforcement 66 Verification 67 Assurance and Accountability 67 Trust of Non-Human or Non-Adult Actors 68 Expressions of Trust 69 Relating Trust and Security 75 Misplaced Trust 75 Chapter 4 Defining Trust in Computing 79 A Survey of Trust Definitions in Computer Systems 79 Other Definitions of Trust within Computing 84 Applying Socio-Philosophical Definitions of Trust to Systems 86 Mathematics and Trust 87 Mathematics and Cryptography 87 Mathematics and Formal Verification 89 Chapter 5 The Importance of Systems 93 System Design 93 The Network Stack 94 Linux Layers 96 Virtualisation and Containers: Cloud Stacks 97 Other Axes of System Design 99 “Trusted” Systems 99 Trust Within the Network Stack 101 Trust in Linux Layers 102 Trust in Cloud Stacks 103 Hardware Root of Trust 106 Cryptographic Hash Functions 110 Measured Boot and Trusted Boot 112 Certificate Authorities 114 Internet Certificate Authorities 115 Local Certificate Authorities 116 Root Certificates as Trust Pivots 119 The Temptations of “Zero Trust” 122 The Importance of Systems 125 Isolation 125 Contexts 127 Worked Example: Purchasing Whisky 128 Actors, Organisations, and Systems 129 Stepping Through the Transaction 130 Attacks and Vulnerabilities 134 Trust Relationships and Agency 136 Agency 136 Trust Relationships 137 The Importance of Being Explicit 145 Explicit Actions 145 Explicit Actors 149 Chapter 6 Blockchain and Trust 151 Bitcoin and Other Blockchains 151 Permissioned Blockchains 152 Trust without Blockchains 153 Blockchain Promoting Trust 154 Permissionless Blockchains and Cryptocurrencies 156 Chapter 7 The Importance of Time 161 Decay of Trust 161 Decay of Trust and Lifecycle 163 Software Lifecycle 168 Trust Anchors, Trust Pivots, and the Supply Chain 169 Types of Trust Anchors 170 Monitoring and Time 171 Attestation 173 The Problem of Measurement 174 The Problem of Run Time 176 Trusted Computing Base 177 Component Choice and Trust 178 Reputation Systems and Trust 181 Chapter 8 Systems and Trust 185 System Components 185 Explicit Behaviour 188 Defining Explicit Trust 189 Dangers of Automated Trust Relationships 192 Time and Systems 194 Defining System Boundaries 198 Trust and a Complex System 199 Isolation and Virtualisation 202 The Stack and Time 205 Beyond Virtual Machines 205 Hardware-Based Type 3 Isolation 207 Chapter 9 Open Source and Trust 211 Distributed Trust 211 How Open Source Relates to Trust 214 Community and Projects 215 Projects and the Personal 217 Open Source Process 219 Trusting the Project 220 Trusting the Software 222 Contents xiii xiv Contents Supply Chain and Products 226 Open Source and Security 229 Chapter 10 Trust, the Cloud, and the Edge 233 Deployment Model Differences 235 What Host Systems Offer 237 What Tenants Need 237 Mutually Adversarial Computing 240 Mitigations and Their Efficacy 243 Commercial Mitigations 243 Architectural Mitigations 244 Technical Mitigations 246 Chapter 11 Hardware, Trust, and Confidential Computing 247 Properties of Hardware and Trust 248 Isolation 248 Roots of Trust 249 Physical Compromise 253 Confidential Computing 256 TEE TCBs in detail 261 Trust Relationships and TEEs 266 How Execution Can Go Wrong—and Mitigations 269 Minimum Numbers of Trustees 276 Explicit Trust Models for TEE Deployments 278 Chapter 12 Trust Domains 281 The Composition of Trust Domains 284 Trust Domains in a Bank 284 Trust Domains in a Distributed Architecture 288 Trust Domain Primitives and Boundaries 292 Trust Domain Primitives 292 Trust Domains and Policy 293 Other Trust Domain Primitives 296 Boundaries 297 Centralisation of Control and Policies 298 Chapter 13 A World of Explicit Trust 301 Tools for Trust 301 The Role of the Architect 303 Architecting the System 304 The Architect and the Trustee 305 Coda 307 References 309 Index 321


Best Sellers


Product Details
  • ISBN-13: 9781119692324
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 241 mm
  • No of Pages: 352
  • Spine Width: 25 mm
  • Width: 193 mm
  • ISBN-10: 1119692326
  • Publisher Date: 14 Dec 2021
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Weight: 861 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Trust in Computer Systems and the Cloud
John Wiley & Sons Inc -
Trust in Computer Systems and the Cloud
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Trust in Computer Systems and the Cloud

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA