Introduction |
|
xv | |
|
|
1 | (18) |
|
Analysing Our Trust Statements |
|
|
4 | (1) |
|
|
5 | (3) |
|
|
8 | (2) |
|
|
10 | (3) |
|
Trust as a Way for Humans to Manage Risk |
|
|
13 | (2) |
|
Risk, Trust, and Computing |
|
|
15 | (4) |
|
Defining Trust in Systems |
|
|
15 | (2) |
|
Defining Correctness in System Behaviour |
|
|
17 | (2) |
|
Chapter 2 Humans and Trust |
|
|
19 | (34) |
|
The Role of Monitoring and Reporting in Creating Trust |
|
|
21 | (3) |
|
|
24 | (4) |
|
|
24 | (3) |
|
Reputation and Generalised Trust |
|
|
27 | (1) |
|
|
28 | (5) |
|
Theories of Institutional Trust |
|
|
29 | (2) |
|
Who Is Actually Being Trusted? |
|
|
31 | (2) |
|
|
33 | (4) |
|
|
37 | (8) |
|
|
37 | (4) |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
43 | (2) |
|
The Dangers of Anthropomorphism |
|
|
45 | (2) |
|
Identifying the Real Trustee |
|
|
47 | (6) |
|
Chapter 3 Trust Operations and Alternatives |
|
|
53 | (26) |
|
Trust Actors, Operations, and Components |
|
|
53 | (14) |
|
Reputation, Transitive Trust, and Distributed Trust |
|
|
59 | (3) |
|
Agency and Intentionality |
|
|
62 | (3) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
Assurance and Accountability |
|
|
67 | (12) |
|
Trust of Non-Human or Non-Adult Actors |
|
|
68 | (1) |
|
|
69 | (6) |
|
Relating Trust and Security |
|
|
75 | (1) |
|
|
75 | (4) |
|
Chapter 4 Denning Trust in Computing |
|
|
79 | (14) |
|
A Survey of Trust Definitions in Computer Systems |
|
|
79 | (7) |
|
Other Definitions of Trust within Computing |
|
|
84 | (2) |
|
Applying Socio-Philosophical Definitions of Trust to Systems |
|
|
86 | (7) |
|
|
87 | (1) |
|
Mathematics and Cryptography |
|
|
87 | (2) |
|
Mathematics and Formal Verification |
|
|
89 | (4) |
|
Chapter 5 The Importance of Systems |
|
|
93 | (58) |
|
|
93 | (6) |
|
|
94 | (2) |
|
|
96 | (1) |
|
Virtualisation and Containers: Cloud Stacks |
|
|
97 | (2) |
|
Other Axes of System Design |
|
|
99 | (1) |
|
|
99 | (11) |
|
Trust Within the Network Stack |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (3) |
|
|
106 | (4) |
|
Cryptographic Hash Functions |
|
|
110 | (15) |
|
Measured Boot and Trusted Boot |
|
|
112 | (2) |
|
|
114 | (1) |
|
Internet Certificate Authorities |
|
|
115 | (1) |
|
Local Certificate Authorities |
|
|
116 | (3) |
|
Root Certificates as Trust Pivots |
|
|
119 | (3) |
|
The Temptations of "Zero Trust" |
|
|
122 | (3) |
|
The Importance of Systems |
|
|
125 | (3) |
|
|
125 | (2) |
|
|
127 | (1) |
|
Worked Example: Purchasing Whisky |
|
|
128 | (17) |
|
Actors, Organisations, and Systems |
|
|
129 | (1) |
|
Stepping Through the Transaction |
|
|
130 | (4) |
|
Attacks and Vulnerabilities |
|
|
134 | (2) |
|
Trust Relationships and Agency |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (8) |
|
The Importance of Being Explicit |
|
|
145 | (6) |
|
|
145 | (4) |
|
|
149 | (2) |
|
Chapter 6 Blockchain and Trust |
|
|
151 | (10) |
|
Bitcoin and Other Blockchains |
|
|
151 | (1) |
|
|
152 | (4) |
|
Trust without Blockchains |
|
|
153 | (1) |
|
Blockchain Promoting Trust |
|
|
154 | (2) |
|
Permissionless Blockchains and Cryptocurrencies |
|
|
156 | (5) |
|
Chapter 7 The Importance of Time |
|
|
161 | (24) |
|
|
161 | (16) |
|
Decay of Trust and Lifecycle |
|
|
163 | (5) |
|
|
168 | (1) |
|
Trust Anchors, Trust Pivots, and the Supply Chain |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (2) |
|
|
173 | (1) |
|
The Problem of Measurement |
|
|
174 | (2) |
|
|
176 | (1) |
|
|
177 | (8) |
|
Component Choice and Trust |
|
|
178 | (3) |
|
Reputation Systems and Trust |
|
|
181 | (4) |
|
Chapter 8 Systems and Trust |
|
|
185 | (26) |
|
|
185 | (3) |
|
|
188 | (6) |
|
|
189 | (3) |
|
Dangers of Automated Trust Relationships |
|
|
192 | (2) |
|
|
194 | (4) |
|
Defining System Boundaries |
|
|
198 | (13) |
|
Trust and a Complex System |
|
|
199 | (3) |
|
Isolation and Virtualisation |
|
|
202 | (3) |
|
|
205 | (1) |
|
|
205 | (2) |
|
Hardware-Based Type 3 Isolation |
|
|
207 | (4) |
|
Chapter 9 Open Source and Trust |
|
|
211 | (22) |
|
|
211 | (3) |
|
How Open Source Relates to Trust |
|
|
214 | (19) |
|
|
215 | (2) |
|
Projects and the Personal |
|
|
217 | (2) |
|
|
219 | (1) |
|
|
220 | (2) |
|
|
222 | (4) |
|
Supply Chain and Products |
|
|
226 | (3) |
|
|
229 | (4) |
|
Chapter 10 Trust, the Cloud, and the Edge |
|
|
233 | (14) |
|
Deployment Model Differences |
|
|
235 | (5) |
|
|
237 | (1) |
|
|
237 | (3) |
|
Mutually Adversarial Computing |
|
|
240 | (3) |
|
Mitigations and Their Efficacy |
|
|
243 | (4) |
|
|
243 | (1) |
|
Architectural Mitigations |
|
|
244 | (2) |
|
|
246 | (1) |
|
Chapter 11 Hardware, Trust, and Confidential Computing |
|
|
247 | (34) |
|
Properties of Hardware and Trust |
|
|
248 | (5) |
|
|
248 | (1) |
|
|
249 | (4) |
|
|
253 | (3) |
|
|
256 | (25) |
|
|
261 | (5) |
|
Trust Relationships and TEEs |
|
|
266 | (3) |
|
How Execution Can Go Wrong--and Mitigations |
|
|
269 | (7) |
|
Minimum Numbers of Trustees |
|
|
276 | (2) |
|
Explicit Trust Models for TEE Deployments |
|
|
278 | (3) |
|
|
281 | (20) |
|
The Composition of Trust Domains |
|
|
284 | (8) |
|
|
284 | (4) |
|
Trust Domains in a Distributed Architecture |
|
|
288 | (4) |
|
Trust Domain Primitives and Boundaries |
|
|
292 | (9) |
|
|
292 | (1) |
|
|
293 | (3) |
|
Other Trust Domain Primitives |
|
|
296 | (1) |
|
|
297 | (1) |
|
Centralisation of Control and Policies |
|
|
298 | (3) |
|
Chapter 13 A World of Explicit Trust |
|
|
301 | (8) |
|
|
301 | (2) |
|
The Role of the Architect |
|
|
303 | (4) |
|
|
304 | (1) |
|
The Architect and the Trustee |
|
|
305 | (2) |
|
|
307 | (2) |
References |
|
309 | (12) |
Index |
|
321 | |