Trust modelling and measurements for the security of information systems

被引:1
|
作者
Coste B. [1 ,2 ]
Ray C. [2 ]
Coatrieux G. [3 ]
机构
[1] Cyber Défense des Systèmes Navals, Ecole navale - CC 600, Brest Cedex 9
[2] Ecole navale - CC 600, Brest Cedex 9
[3] IMT Atlantique Technopole Brest-Iroise, CS 83818, Brest Cedex 3
来源
| 1600年 / Lavoisier卷 / 22期
关键词
Security of information systems; Trust;
D O I
10.3166/ISI.22.1.19-41
中图分类号
学科分类号
摘要
The proliferation of sensors and communicating devices has significantly enhanced information systems (IS). However, these sources can be deceived or under a third party’s control who can forge pieces of information produced by them. This raises new issues concerning trust one has in information, sources and IS affected. This article studies security of IS thanks to trust in sources. Definition then evaluation of trust in this context are introduced. Thus, a model of sources taking into account competence and sincerity is proposed. Those two features are studied and measured to allow trust’s evaluation. Simulations based on a real dataset shows relevance of our approach. This study is applied to ship’s navigation data analysis. © 2017 Lavoisier.
引用
收藏
页码:19 / 41
页数:22
相关论文
共 50 条
  • [31] Security of information in IT systems
    Kaliczynska, M
    [J]. Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments III, 2005, 5775 : 571 - 576
  • [32] When security meets software engineering: a case of modelling secure information systems
    Mouratidis, H
    Giorgini, P
    Manson, G
    [J]. INFORMATION SYSTEMS, 2005, 30 (08) : 609 - 629
  • [33] Smartphone security: understanding smartphone users' trust in information security management
    Jang, Yu-Teng
    Chang, Shuchih Ernest
    Tsai, Yi-Jey
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1313 - 1321
  • [34] Modelling trust formation in health information contexts
    Johnson, Frances
    Rowley, Jennifer
    Sbaffi, Laura
    [J]. JOURNAL OF INFORMATION SCIENCE, 2015, 41 (04) : 415 - 429
  • [35] Modelling downgrading in information flow security
    Bossi, A
    Piazza, C
    Rossi, S
    [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 187 - 201
  • [36] A Study on Information Security Situation Modelling
    Srivastava, Ashish
    Shrivastava, Pallavi
    [J]. 2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [37] Information systems resources and information security
    Chang, Kuo-chung
    Wang, Chih-ping
    [J]. INFORMATION SYSTEMS FRONTIERS, 2011, 13 (04) : 579 - 593
  • [38] Information systems resources and information security
    Kuo-chung Chang
    Chih-ping Wang
    [J]. Information Systems Frontiers, 2011, 13 : 579 - 593
  • [39] Redefining Information Systems Security: Viable Information Systems
    Karyda, M
    Kokolakis, S
    Kiountouzis, E
    [J]. TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 453 - 467
  • [40] Information and communications security, privacy and trust: Standards and regulations
    Thuraisingham, Bhavani
    Gritzalis, Stefanos
    [J]. COMPUTER STANDARDS & INTERFACES, 2010, 32 (5-6) : 229 - 229