Hardware Security Appliances for Trust

This paper looks at the trust relationships that exist within an outsourcing scenario finding that whilst some of the trust relationships are clear other implicit trust relationships need exposing. These implicit trust relationships are often a result of information supplied for the main explicit task for which an entity is being trusted. The use of hardware security appliance based services is proposed allowing trust to be dissipated over multiple parties whilst retaining efficient execution. Such an approach helps mitigate these implicit trust relationships by increasing the control and transparency given to the trustor.

[1]  Marco Casassa Mont,et al.  Trust services: a framework for service-based solutions , 2002, Proceedings 26th Annual International Computer Software and Applications.

[2]  Marco Casassa Mont,et al.  POWER prototype: towards integrated policy-based management , 2000, NOMS 2000. 2000 IEEE/IFIP Network Operations and Management Symposium 'The Networked Planet: Management Beyond 2000' (Cat. No.00CB37074).

[3]  Yao-Hua Tan,et al.  Trust and Deception in Virtual Societies , 2001, Springer Netherlands.

[4]  Simon Shiu,et al.  Encryption and key management in a SAN , 2002, First International IEEE Security in Storage Workshop, 2002. Proceedings..

[5]  C. Castelfranchi,et al.  Why trust and deception are essential for virtual societies , 2001 .

[6]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[7]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.