Towards Trustworthy Information Sharing by Creating Cyber Security Alliances

被引:6
作者
Deljoo, Ameneh [1 ]
van Engers, Tom [2 ]
Koning, Ralph [1 ]
Gommans, Leon [3 ]
de Laat, Cees [1 ]
机构
[1] Univ Amsterdam, Fac Sci, Inst Informat, Amsterdam, Netherlands
[2] Univ Amsterdam, Leibniz Ctr Law, Amsterdam, Netherlands
[3] AirFrance KLM, Amsterdam, Netherlands
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) | 2018年
关键词
Computational trust; alliances; cyber security; information sharing; service provider group; TRUST; POWER;
D O I
10.1109/TrustCom/BigDataSE.2018.00213
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As attacks are becoming more and more organized, collaboration amongst network domain owners is required next to arranging technical counter measures. Sharing cyber intelligence amongst network domain owners is, therefore, becoming increasingly important. Additionally, networks have grown scale, complexity, and degree of inter-connectedness, such that their protection can often only be guaranteed and financed as a shared effort. In this paper, we introduce the concept of cyber security alliance shaped by different organizations that facilitate the sharing of incident information across them. Creating a cyber security alliance highlights requirements such as: 1) creates and manages trust among the members, 2) introduces a federated governance model, creating common policies, standards for alliance's members, and 3) provides a strong incentive to partners to join an alliance by introducing a common benefit. This paper discusses ongoing research on a social trust model, which helps the members to select the right partner to perform joint tasks, and encourages sharing of incident information. Furthermore, we use the service provider group framework as a way to arrange the establishment of our proposed cyber security alliance that coordinates activities across the alliance to establish trust. We present our social computational trust model and its antecedents.
引用
收藏
页码:1506 / 1510
页数:5
相关论文
共 15 条
  • [1] Trust, power and control in trans-organizational relations
    Bachmann, R
    [J]. ORGANIZATION STUDIES, 2001, 22 (02) : 337 - 365
  • [2] TRUSTWORTHINESS AS A SOURCE OF COMPETITIVE ADVANTAGE
    BARNEY, JB
    HANSEN, MH
    [J]. STRATEGIC MANAGEMENT JOURNAL, 1994, 15 : 175 - 190
  • [3] Cellucci ThomasA., 2010, Innovative Public-Private Partnerships: Pathway to Effectively Solving Problems
  • [4] Deljoo Ameneh, 2016, ICAART 2016. 8th International Conference on Agents and Artificial Intelligence. Proceedings, P275
  • [5] Deljoo A., 2016, LOOK INT WORKSH SOFT
  • [6] Deljoo A, 2017, AAAI 17 WORKSH KNOWL
  • [7] The Service Provider Group framework A framework for arranging trust and power to facilitate authorization of network services
    Gommans, Leon
    Vollbrecht, John
    Gommans-de Bruijn, Betty
    de laat, Cees
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 45 : 176 - 192
  • [8] Koning R., 2017, OPTICAL FIBER COMMUN, P1
  • [9] Konings R, 2017, R STUD TRANSP ANAL, V6, P1
  • [10] The human amygdala is necessary for developing and expressing normal interpersonal trust
    Koscik, Timothy R.
    Tranel, Daniel
    [J]. NEUROPSYCHOLOGIA, 2011, 49 (04) : 602 - 611