f-26dd-5364-8053-ad97567f9a89">
Table of Contents
1 Cover
2 Praise for Trust in Computer Systems and the Cloud
5 CHAPTER 1: Why Trust? Analysing Our Trust Statements What Is Trust? What Is Agency? Trust and Security Trust as a Way for Humans to Manage Risk Risk, Trust, and Computing Notes
6 CHAPTER 2: Humans and Trust The Role of Monitoring and Reporting in Creating Trust Game Theory Institutional Trust Trust Based on Authority Trusting Individuals The Dangers of Anthropomorphism Identifying the Real Trustee Notes
7 CHAPTER 3: Trust Operations and Alternatives Trust Actors, Operations, and Components Assurance and Accountability Notes
8 CHAPTER 4: Defining Trust in Computing A Survey of Trust Definitions in Computer Systems Applying Socio-Philosophical Definitions of Trust to Systems Notes
9 CHAPTER 5: The Importance of Systems System Design “Trusted” Systems Hardware Root of Trust The Importance of Systems Worked Example: Purchasing Whisky The Importance of Being Explicit Notes
10 CHAPTER 6: Blockchain and Trust Bitcoin and Other Blockchains Permissioned Blockchains Permissionless Blockchains and Cryptocurrencies Notes
11 CHAPTER 7: The Importance of Time Decay of Trust Trusted Computing Base Notes
12 CHAPTER 8: Systems and Trust System Components Explicit Behaviour Time and Systems Defining System Boundaries Notes
13 CHAPTER 9: Open Source and Trust Distributed Trust How Open Source Relates to Trust Notes
14 CHAPTER 10: Trust, the Cloud, and the Edge Deployment Model Differences Mutually Adversarial Computing Mitigations and Their Efficacy Notes
15 CHAPTER 11: Hardware, Trust, and Confidential Computing Properties of Hardware and Trust Physical Compromise Confidential Computing Notes
16 CHAPTER 12: Trust Domains The Composition of Trust Domains Trust Domain Primitives and Boundaries Notes
17 CHAPTER