![]() |
trust and securityveryard projects > trust > materialveryard projects > material > trust |
on this page | access to this material is subject to commercial terms | links | ||||||
recent articles |
|
![]()
notes for product vendors |
![]() |
Recent articlesveryard projects > trust > material > recent articles |
![]() |
title | abstract | publication | access |
Trustworthy Computing | We develop a simple maturity model for Trustworthy Computing, and evaluate Microsoft's progress to date. | March 2003 | |
Web Service Security | Microsoft and IBM are currently pushing different notions of trust and security. Microsoft is appealing to a model that harks back to the Fortress Mainframe of the 1960s, while IBM is developing a radically different model that appeals to biological rather than military metaphors. | CBDi Forum Interact
Jan 2002 |
Silver/Gold
members of CBDi Forum |
Trusting Components | The shift towards components and web services, and the increased separation between the producer and the consumer of a component or service, puts a growing emphasis on questions of trust. If we can’t trust components and services from external sources, how can we expect and ensure adequate security in the businesses and systems that use these services? In this report we examine the security and trust aspects of business interchange using components and web services, mainly from the consumer/procurement standpoint. | CBDi Forum Interact
April 2001 |
Silver/Gold
members of CBDi Forum |
top | ![]() |
Copyright © 2001-2003 Veryard Projects Ltd http://www.veryard.com/trust/material.htm |