Trust and Mistrust Management in Enterprise Systems
نویسنده
چکیده
Työn nimi — Arbetets titel — Title Oppiaine — Läroämne — Subject Työn laji — Arbetets art — Level Aika — Datum — Month and year Sivumäärä — Sidoantal — Number of pages Tiivistelmä — Referat — Abstract Avainsanat — Nyckelord — Keywords Säilytyspaikka — Förvaringsställe — Where deposited Muita tietoja — Övriga uppgifter — Additional information Kumpula Science Library, C–2011–XX In the near future world of dynamic open service ecosystem, where enterprises collaborate with various partners to further their business goals, there are new challenges in managing threats such collaboration brings, especially malicious peers. Traditional security solutions relying on restricting access on individual partner basis are not feasible in this open dynamic environment. Instead, the new community security requirements can be better met with new detective controls utilizing high level information. This thesis proposes a model where trust is utilized as the community member security solution. The solution consists of trust-guarded authorisation augmented by peer behaviour monitoring and continuous feedback for mistrust management. First, an extensive survey of trust management and an ontology built based on that shows how different types of trust can be utilised in enterprise computer systems and how trust-guarded authorisation is a valid realisation of the theoretical trust formation process. Second, for mistrust management this thesis surveys existing application intrusion detection mechanisms to find suitable mechanisms for peer behaviour monitoring and feedback. Thus this thesis combined two previously well known and separatebly implemented components in a novel way. The final contribution of this thesis is the TuBE community member security framework design based on the model above. The design shows how i) the trusting decisions are instrumented when an enterprise is engaging in collaboration, ii) the intrusion detection type monitoring is used at each service participant, iii) the collaboration can be terminated or restructured based on an observed intrusion or policy violation, and iv) how the observation affects the reputation and future trust decisions for the violating participant.
منابع مشابه
P2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملProviding an Enterprise Architecture Framework Model for Laboratory Information Management Systems by Service Oriented Approach
Background and Aim: Laboratories are one of the most important scientific and research centers. Laboratory information management systems provide a platform for recording the information and collaborating between researchers. The main purpose of this study was suggesting an organizational architecture model of laboratory information management systems. Materials and Methods: This study was a ...
متن کاملNew Realities of the Enterprise Management System Information Support: Economic and Mathematical Models and Cloud Technologies
The paper focuses on the urgency of the implementation of cloud technologies, which are a necessary condition for the development of enterprise management systems, give rise to a complex of insufficiently studied phenomena and processes and determine the need to find new tools in making and implementing reasonable management decisions. In the process of research, the sequence of construction an...
متن کاملSeparating Between Trust and Access Control Policies: A necessity for Web Applications
As Security is the key of success for Web Applications most of the efforts that have been put in this domain have focused on wining users’ trust to adopt the Web environment for their business operations. Although user trust is of paramount importance for Web applications, one also needs to consider Web applications trust towards users here after referred to as user trustworthiness. This paper ...
متن کاملDistrust, mistrust, untrust and information practices
Introduction. We report the results of an investigation of the role and implications of the shortage of trust (untrust), mistrust and distrust in the context of information work. Whereas trust has been discussed extensively in information studies literature, its ’dark side’ has been largely omitted before. Method. The conceptual discussion is based on empirical material gathered using thematic ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011