Engineering Trust- and Reputation-based Security Controls for Future Internet Systems

被引:1
作者
Beckers, Kristian [1 ]
Heisel, Maritta [1 ]
Moyano, Francisco [2 ]
Fernandez-Gago, Carmen [2 ]
机构
[1] Paluno Ruhr Inst Software Technol Duisburg, Essen, Germany
[2] Univ Malaga, Dept Comp Sci, Malaga, Spain
来源
30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II | 2015年
关键词
Problem Frames; Model-driven Engineering; Security Requirements Engineering; Trust;
D O I
10.1145/2695664.2695713
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Reputation as a decision criteria for whom to trust has been successfully adopted by a few internet-based businesses such as ebay or Amazon. Moreover, trust evaluation is becoming of increasing importance for future internet systems such as smart grids, because these contain potentially millions of users, their data, and a huge number of subsystems. The resulting scale and complexity makes them ideal candidates for trust and reputation based security controls, but currently engineering methodologies are missing that provide structured step-by-step instructions on how to design such controls. We contribute such a methodology including tool support that helps (i) to elicit trust relationships, (ii) to reason about how to construct trust and reputation engines for these and finally (iii) to specify consequent security controls. The methodology is based on formal OCL-expressions that provide (semi-)automatic support analysing UML models with regard to trust and reputation information.
引用
收藏
页码:1344 / 1349
页数:6
相关论文
共 23 条
  • [1] Alebrahim Azadeh, 2014, Requirements Engineering: Foundation for Software Quality. 20th International Working Conference, REFSQ 2014. Proceedings: LNCS 8396, P200, DOI 10.1007/978-3-319-05843-6_15
  • [2] Alebrahim A., 2012, P 8 INT ACM SIGSOFT, P43
  • [3] [Anonymous], OMG OBJ CONSTR LANG
  • [4] [Anonymous], 2011, PROT PROF GAT SMART
  • [5] Beckers Kristian, 2014, Privacy Technologies and Policy. First Annual Privacy Forum, APF 2012. Revised Selected Papers: LNCS 8319, P1, DOI 10.1007/978-3-642-54069-1_1
  • [6] Beckers K., 2013, P SAC, P937
  • [7] Beckers K., 2014, J WIRELESS MOBILE NE, V5, P37
  • [8] Beckers K, 2013, PROC INT SYMP SOFTW, P238, DOI 10.1109/ISSRE.2013.6698923
  • [9] Cote I., 2012, SYSTEMATIC APPROACH
  • [10] Côté I, 2011, INT REQUIR ENG CONF, P349, DOI 10.1109/RE.2011.6051670