TY - GEN
T1 - Evidence-Based trust reasoning
AU - Huang, Jingwei
AU - Nicol, David M.
PY - 2014
Y1 - 2014
N2 - Trust is a necessary component in cybersecurity. It is a common task for a system to make a decision about whether or not to trust the credential of an entity from another domain, issued by a third party. Generally, in the cyberspace, connected and interacting systems largely rely on each other with respect to security, privacy, and performance. In their interactions, one entity or system needs to trust others, and this "trust" frequently becomes a vulnerability of that system. Aiming at mitigating the vulnerability, we are developing a computational theory of trust, as a part of our efforts towards Science of Security. Previously, we developed a formal-semantics-based calculus of trust [3, 2], in which trust can be calculated based on a trustor's direct observation on the performance of the trustee, or based on a trust network. In this paper, we construct a framework for making trust reasoning based on the observed evidence. We take privacy in cloud computing as a driving application case [5].
AB - Trust is a necessary component in cybersecurity. It is a common task for a system to make a decision about whether or not to trust the credential of an entity from another domain, issued by a third party. Generally, in the cyberspace, connected and interacting systems largely rely on each other with respect to security, privacy, and performance. In their interactions, one entity or system needs to trust others, and this "trust" frequently becomes a vulnerability of that system. Aiming at mitigating the vulnerability, we are developing a computational theory of trust, as a part of our efforts towards Science of Security. Previously, we developed a formal-semantics-based calculus of trust [3, 2], in which trust can be calculated based on a trustor's direct observation on the performance of the trustee, or based on a trust network. In this paper, we construct a framework for making trust reasoning based on the observed evidence. We take privacy in cloud computing as a driving application case [5].
KW - Evidence-based trust
KW - Privacy
KW - Trust model
UR - http://www.scopus.com/inward/record.url?scp=84906810265&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84906810265&partnerID=8YFLogxK
U2 - 10.1145/2600176.2600193
DO - 10.1145/2600176.2600193
M3 - Conference contribution
AN - SCOPUS:84906810265
SN - 9781450329071
T3 - ACM International Conference Proceeding Series
BT - Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014
PB - Association for Computing Machinery
T2 - 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014
Y2 - 8 April 2014 through 9 April 2014
ER -