Trust modelling and measurements for the security of information systems

被引:1
|
作者
Coste B. [1 ,2 ]
Ray C. [2 ]
Coatrieux G. [3 ]
机构
[1] Cyber Défense des Systèmes Navals, Ecole navale - CC 600, Brest Cedex 9
[2] Ecole navale - CC 600, Brest Cedex 9
[3] IMT Atlantique Technopole Brest-Iroise, CS 83818, Brest Cedex 3
来源
| 1600年 / Lavoisier卷 / 22期
关键词
Security of information systems; Trust;
D O I
10.3166/ISI.22.1.19-41
中图分类号
学科分类号
摘要
The proliferation of sensors and communicating devices has significantly enhanced information systems (IS). However, these sources can be deceived or under a third party’s control who can forge pieces of information produced by them. This raises new issues concerning trust one has in information, sources and IS affected. This article studies security of IS thanks to trust in sources. Definition then evaluation of trust in this context are introduced. Thus, a model of sources taking into account competence and sincerity is proposed. Those two features are studied and measured to allow trust’s evaluation. Simulations based on a real dataset shows relevance of our approach. This study is applied to ship’s navigation data analysis. © 2017 Lavoisier.
引用
收藏
页码:19 / 41
页数:22
相关论文
共 50 条
  • [1] The Ontological Status of Trust in Information Security
    Astakhova, L. V.
    SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2016, 43 (01) : 58 - 65
  • [2] A Layered Trust Information Security Architecture
    Albuquerque, Robson De Oliveira
    Garcia Villalba, Luis Javier
    Sandoval Orozco, Ana Lucila
    Buiati, Fabio
    Kim, Tai-Hoon
    SENSORS, 2014, 14 (12): : 22754 - 22772
  • [3] Exploring Trust and Information Monitoring for Information Security Management
    Chang, Shuchih Ernest
    Liu, Anne Yenching
    Jang, Yu-Teng Jacky
    2017 10TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI), 2017,
  • [4] Information Security Policy Compliance: Leadership and Trust
    Paliszkiewicz, Joanna
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) : 211 - 217
  • [5] Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach
    Mattia Salnitri
    Konstantinos Angelopoulos
    Michalis Pavlidis
    Vasiliki Diamantopoulou
    Haralambos Mouratidis
    Paolo Giorgini
    Software and Systems Modeling, 2020, 19 : 467 - 491
  • [6] Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach
    Salnitri, Mattia
    Angelopoulos, Konstantinos
    Pavlidis, Michalis
    Diamantopoulou, Vasiliki
    Mouratidis, Haralambos
    Giorgini, Paolo
    SOFTWARE AND SYSTEMS MODELING, 2020, 19 (02) : 467 - 491
  • [7] Smartphone security: understanding smartphone users' trust in information security management
    Jang, Yu-Teng
    Chang, Shuchih Ernest
    Tsai, Yi-Jey
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1313 - 1321
  • [8] Extracting trust information from security system of a service
    Bahtiyar, Serif
    Caglayan, Mehmet Ufuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) : 480 - 490
  • [9] Trust in information security technology: An intellectual property analysis
    Pigola, Angelica
    Meirelles, Fernando de Souza
    da Costa, Priscila Rezende
    Porto, Geciane Silveira
    WORLD PATENT INFORMATION, 2024, 78
  • [10] Trust and distrust in information systems at the workplace
    Thielsch, Meinald T.
    Meessen, Sarah M.
    Hertel, Guido
    PEERJ, 2018, 6