Unraveling trust management in cybersecurity: insights from a systematic literature review

被引:0
|
作者
Pigola, Angelica [1 ]
Meirelles, Fernando de Souza [1 ]
机构
[1] Fundacao Getulio Vargas FGV EAESP, Sao Paulo Business Sch, Ave 9 Julho,2029 Bela Vista, BR-01313902 Sao Paulo, SP, Brazil
关键词
Trust management; Systematic literature review; Cybersecurity; Information security; INFORMATION-SYSTEMS; THREAT MITIGATION; RISK-MANAGEMENT; SECURITY; PRIVACY; BLOCKCHAIN; INTERNET; DESIGN; REQUIREMENTS; METHODOLOGY;
D O I
10.1007/s10799-024-00438-x
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This paper presents the findings of a systematic literature review aimed at elucidating the key anchors, strategies, methods, and techniques pertinent to trust management (TM) in cybersecurity. Drawing upon a meticulous analysis of 106 scholarly papers published between 2001 and 2024, the review offers a comprehensive overview of TM in cybersecurity practices in diverse cyber contexts. The study identifies seven foundational anchors crucial for effective TM frameworks: authentication, authorization, access control, privacy protection, monitoring and auditing, encryption and cryptography, risk management, and iterative and interactive trust processes. Additionally, ten overarching strategies emerge from the synthesis of literature, encompassing identity and access management, role-based access control, least privilege principle, digital certificates or public key infrastructure, security policies and procedures, encryption and data protection, continuous monitoring and risk assessment, vendor and third-party risk management, compliance management and continuous collaboration. Furthermore, the review delineates several methods instrumental in TM processes, and various techniques augmenting these methods were also identified, ranging from trust scoring algorithms and trust aggregation mechanisms to trust reasoning engines and trust-aware routing protocols. The synthesis of literature not only elucidates the multifaceted nature of TM in cybersecurity presented in a framework but also underscores the evolving strategies and technologies employed to establish and maintain trust in dynamic digital ecosystems. By providing a comprehensive overview of anchors, strategies, methods, and techniques in TM in cybersecurity. This review offers valuable insights for practitioners, researchers, and policymakers engaged in enhancing trustworthiness and resilience in contemporary cyber environments.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity Understanding
    Khanan, Akbar
    Mohamed, Yasir Abdelgadir
    Mohamed, Abdul Hakim H. M.
    Bashir, Mohamed
    [J]. IEEE ACCESS, 2024, 12 : 59289 - 59317
  • [2] Cybersecurity research from a management perspective: A systematic literature review and future research agenda
    Lohrke, Franz T.
    Frownfelter-Lohrke, Cynthia
    [J]. JOURNAL OF GENERAL MANAGEMENT, 2023,
  • [3] Are collaboration and trust sources for innovation in the reverse logistics? Insights from a systematic literature review
    de Paula, Istefani Carisio
    de Campos, Elaine Aparecida Regiani
    Pagani, Regina Negri
    Guarnieri, Patricia
    Kaviani, Mohammad Amin
    [J]. SUPPLY CHAIN MANAGEMENT-AN INTERNATIONAL JOURNAL, 2020, 25 (02) : 176 - 222
  • [4] Trust and commitment in supply chain management: a systematic review of literature
    Paluri, Ratna Achuta
    Mishal, Aditi
    [J]. BENCHMARKING-AN INTERNATIONAL JOURNAL, 2020, 27 (10) : 2831 - 2862
  • [5] An Assessment of Capabilities Required for Effective Cybersecurity Incident Management - A Systematic Literature Review
    Falowo, Olufunsho I.
    Koshoedo, Kehinde
    Ozer, Murat
    [J]. 2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 1 - 11
  • [6] Evolution of Cybersecurity Concerns: A Systematic Literature Review
    Ganapati, Sukumar
    Ahn, Michael
    Reddick, Christopher G.
    [J]. TOGETHER IN THE UNSTABLE WORLD: DIGITAL GOVERNMENT AND SOLIDARITY, 2023, : 90 - 97
  • [7] Text Mining in Cybersecurity: A Systematic Literature Review
    Ignaczak, Luciano
    Goldschmidt, Guilherme
    Da Costa, Cristiano Andre
    Righi, Rodrigo Da Rosa
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (07)
  • [8] Blockchain for Cybersecurity: Systematic Literature Review and Classification
    Liu, Marina
    Yeoh, William
    Jiang, Frank
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (06) : 1182 - 1198
  • [9] Cognitively Available Cybersecurity: A Systematic Literature Review
    Kavrestad, Joakim
    Naqvi, Bilal
    [J]. HUMAN-CENTERED SOFTWARE ENGINEERING, HCSE 2024, 2024, 14793 : 160 - 170
  • [10] Trust management in the internet of vehicles: a systematic literature review of blockchain integration
    Abbasi, Shirin
    Khaledian, Navid
    Rahmani, Amir Masoud
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (04) : 3065 - 3088