An Explicit Trust Model Towards Better System Security
نویسندگان
چکیده
Trust is an absolute necessity for digital communications; but is often viewed as an implicit singular entity. The use of the internet as the primary vehicle for information exchange has made accountability and verifiability of system code almost obsolete. This paper proposes a novel approach towards enforcing system security by requiring the explicit definition of trust for all operating code. By identifying the various classes and levels of trust required within a computing system; trust is defined as a combination of individual characteristics. Trust is then represented as a calculable metric obtained through the collective enforcement of each of these characteristics to varying degrees. System Security is achieved by facilitating trust to be a constantly evolving aspect for each operating code segment capable of getting stronger or weaker over time.
منابع مشابه
An Extension of the Technology Acceptance Model for the E-Repurchasing of Sports Match Tickets
The purpose of the present study is to investigate effective factors in making people willing to repurchase sports match tickets online with the approach of extending technology acceptance model. This research is considered applied regarding its purpose, descriptive- survey regarding its method, and is based on Structural Equation Model (SEM). The participants are Iran's national volleyball tea...
متن کاملDesigning a novel structure of explicit model predictive control with application in a buck converter system
This paper proposes a novel structure of model predictive control algorithm for piecewise affine systems as a particular class of hybrid systems. Due to the time consuming and computational complexity of online optimization problem in MPC algorithm, the explicit form of MPC which is called Explicit MPC (EMPC) is applied in order to control of buck converter. Since the EMPC solves the optimizati...
متن کاملGTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملTowards Secure Information-centric Naming
The predominant usage of the Internet for content retrieval has lead to a new communication paradigm called information-centric networking (ICN). In this paradigm, the main concern is to fetch content from the network without the explicit knowledge where the content, or its copy, is currently located. Although the migration to the ICN paradigm is already taking place, the underlying naming syst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1403.0282 شماره
صفحات -
تاریخ انتشار 2013