Defusing Intrusion Capabilities by Collaborative Anomalous Trust Management

被引:1
|
作者
Abuosba, Khalil [1 ]
Martin, Clemens [1 ]
机构
[1] Univ Ontario, Philadelphia Univ, Inst Technol, Toronto, ON, Canada
关键词
D O I
10.1109/WETICE.2008.32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
From a computer security perspective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative Anomalous Trust Management (CATM) is a methodology that may be utilized for the purpose of affirming trust between communications endpoints. In conjunction with Trusted Computing Base, Zero Knowledge Protocol, and Layered Trust, CATM is defined. CATM builds its trust credentials based on computing environment variables. Ideally this methodology is suited for Service Oriented Architectures such as web services where set-vice providers and consumers interact at different levels of security requirements. This methodology is best optimized for use as a risk management utility. In this approach vulnerabilities are implicitly reduced, hence intrusion capabilities are defused
引用
收藏
页码:263 / 268
页数:6
相关论文
共 50 条
  • [21] The Multidimensionality of Trust: Applications in Collaborative Natural Resource Management
    Stern, Marc J.
    Coleman, Kimberly J.
    [J]. SOCIETY & NATURAL RESOURCES, 2015, 28 (02) : 117 - 132
  • [22] A Personalized Group Trust Management System for Collaborative Services
    Li, Xiaolin
    Zhao, Huanyu
    [J]. 2008 PROCEEDINGS OF 17TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2008, : 963 - 968
  • [23] Reputation Management System for Fostering Trust in Collaborative and Cohesive Disaster Management
    Javed, Sabeen
    Afzal, Hammad
    Arif, Fahim
    Majeed, Awais
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (07) : 347 - 357
  • [25] Trust plus capabilities
    Tinsley, DB
    [J]. ACADEMY OF MANAGEMENT REVIEW, 1996, 21 (02): : 335 - 337
  • [26] Mediating Role of Trust on the Effects of Knowledge Management Capabilities on Organizational Performance
    Alaarj, Saad
    Abidin-Mohamed, Zainal
    Bustamam, Ummi Salwa Binti Ahmad
    [J]. 12TH INTERNATIONAL STRATEGIC MANAGEMENT CONFERENCE, ISMC 2016, 2016, 235 : 729 - 738
  • [27] Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust
    Li, Wenjuan
    Meng, Weizhi
    Zhu, Hui
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1180 - 1187
  • [28] Lightweight, Trust-Managing, and Privacy-Preserving Collaborative Intrusion Detection for Internet of Things
    Wardana, Aulia Arif
    Kolaczek, Grzegorz
    Sukarno, Parman
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (10):
  • [29] Collaborative intrusion prevention
    Chung, Simon P.
    Mok, Aloysius K.
    [J]. WET ICE 2007: 16TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2007, : 395 - 400
  • [30] Boundary spanners as trust ambassadors in collaborative natural resource management
    Coleman, Kimberly
    Stern, Marc J.
    [J]. JOURNAL OF ENVIRONMENTAL PLANNING AND MANAGEMENT, 2018, 61 (02) : 291 - 308