Unraveling trust management in cybersecurity: insights from a systematic literature review

被引:1
作者
Pigola, Angelica [1 ]
Meirelles, Fernando de Souza [1 ]
机构
[1] Fundacao Getulio Vargas FGV EAESP, Sao Paulo Business Sch, Ave 9 Julho,2029 Bela Vista, BR-01313902 Sao Paulo, SP, Brazil
关键词
Trust management; Systematic literature review; Cybersecurity; Information security; INFORMATION-SYSTEMS; THREAT MITIGATION; RISK-MANAGEMENT; SECURITY; PRIVACY; INTERNET; BLOCKCHAIN; DESIGN; REQUIREMENTS; METHODOLOGY;
D O I
10.1007/s10799-024-00438-x
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This paper presents the findings of a systematic literature review aimed at elucidating the key anchors, strategies, methods, and techniques pertinent to trust management (TM) in cybersecurity. Drawing upon a meticulous analysis of 106 scholarly papers published between 2001 and 2024, the review offers a comprehensive overview of TM in cybersecurity practices in diverse cyber contexts. The study identifies seven foundational anchors crucial for effective TM frameworks: authentication, authorization, access control, privacy protection, monitoring and auditing, encryption and cryptography, risk management, and iterative and interactive trust processes. Additionally, ten overarching strategies emerge from the synthesis of literature, encompassing identity and access management, role-based access control, least privilege principle, digital certificates or public key infrastructure, security policies and procedures, encryption and data protection, continuous monitoring and risk assessment, vendor and third-party risk management, compliance management and continuous collaboration. Furthermore, the review delineates several methods instrumental in TM processes, and various techniques augmenting these methods were also identified, ranging from trust scoring algorithms and trust aggregation mechanisms to trust reasoning engines and trust-aware routing protocols. The synthesis of literature not only elucidates the multifaceted nature of TM in cybersecurity presented in a framework but also underscores the evolving strategies and technologies employed to establish and maintain trust in dynamic digital ecosystems. By providing a comprehensive overview of anchors, strategies, methods, and techniques in TM in cybersecurity. This review offers valuable insights for practitioners, researchers, and policymakers engaged in enhancing trustworthiness and resilience in contemporary cyber environments.
引用
收藏
页数:23
相关论文
共 132 条
[61]   Cybersecurity threats mitigation in Internet of Vehicles communication system using reliable clustering and routing [J].
Kadam, Megha, V ;
Mahajan, Hemant B. ;
Uke, Nilesh J. ;
Futane, Pravin R. .
MICROPROCESSORS AND MICROSYSTEMS, 2023, 102
[62]   Modelling corporate wireless security and privacy [J].
Katos, V ;
Adams, C .
JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2005, 14 (03) :307-321
[63]   TWO STRATEGIES FOR INDUCTIVE REASONING IN ORGANIZATIONAL RESEARCH [J].
Ketokivi, Mikko ;
Mantere, Saku .
ACADEMY OF MANAGEMENT REVIEW, 2010, 35 (02) :315-333
[64]   Barriers to blockchain technology adoption in supply chains: the case of India [J].
Khan, Shahbaz ;
Haleem, Abid ;
Husain, Zafar ;
Samson, Daniel ;
Pathak, R. D. .
OPERATIONS MANAGEMENT RESEARCH, 2023, 16 (02) :668-683
[65]   Quantitative trust management with QoS-aware service selection [J].
Kim, Yukyong ;
Shin, Yongtae ;
Doh, Kyung-Goo .
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2015, 11 (03) :247-264
[66]   Qualitative trust modeling in SOA [J].
Kovac, Damjan ;
Trcek, Denis .
JOURNAL OF SYSTEMS ARCHITECTURE, 2009, 55 (04) :255-263
[67]   AGE: authentication in gadget-free healthcare environments [J].
Kumar, Tanesh ;
Braeken, An ;
Jurcut, Anca Delia ;
Liyanage, Madhusanka ;
Ylianttila, Mika .
INFORMATION TECHNOLOGY & MANAGEMENT, 2020, 21 (02) :95-114
[68]   Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks [J].
Kusyk J. ;
Uyar M.U. ;
Sahin C.S. .
Evolutionary Intelligence, 2018, 10 (3-4) :95-117
[69]   Strategic signaling through cloud service certifications: Comparing the relative importance of certifications' assurances to companies and consumers [J].
Lansing, Jens ;
Siegfried, Nils ;
Sunyaev, Ali ;
Benlian, Alexander .
JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2019, 28 (04)
[70]   An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication [J].
Lee, Jeongho ;
Choi, Hyoung-Kee ;
Yoon, Jin Hee ;
Kim, Seongjune .
IEEE ACCESS, 2023, 11 :141610-141627