Attributes and Dimensions of Trust in Secure Systems

被引:0
作者
Bradbury, Matthew [1 ]
Prince, Daniel [1 ]
Marcinkiewicz, Victoria [2 ]
Watson, Tim [3 ]
机构
[1] Univ Lancaster, Sch Comp & Commun, Lancaster, England
[2] Cardiff Univ, IROHMS, Sch Psychol, Cardiff, Wales
[3] Alan Turing Inst, London, England
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS 2022, IOT 2022 | 2022年
基金
英国工程与自然科学研究理事会;
关键词
Trust; trustworthy; attributes; dimensions; limitations;
D O I
10.1145/3567445.3571105
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
What is it to be trusted? This is an important question as trust is increasingly placed in a system and the degree to which a system is trusted is increasingly being assessed. However, there are issues with how related terms are used. Many definitions focus on one attribute of trust (typically behaviour) preventing that definition from being used for other attributes (e.g., identity). This is confused further by conflating what trustors measure about a trustee and what conclusions a trustor reaches about a trustee. Therefore, in this paper we present definitions of measures (trustiness and trustworthiness) and conclusions (trusted and trustworthy). These definitions are general and do not refer to a specific attribute allowing them to be used with arbitrary attributes which are being assessed (e.g., identity, behaviour, limitation, execution, correctness, data, environment). In addition, in order to demonstrate the complexities of describing if a trustee is designated as trusted or trustworthy, a set of dimensions are defined to describe attributes (time, scale, proactive/reactive, strength, scope, source). Finally, an example system is classified using these attributes and their dimensions in order to highlight the complexities of describing a system as holistically trusted or trustworthy.
引用
收藏
页码:179 / 186
页数:8
相关论文
共 37 条
  • [1] Digital Trust - Trusted Computing and Beyond A Position Paper
    Akram, Raja Naeem
    Ko, Ryan K. L.
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 884 - 892
  • [2] [Anonymous], 1995, The official PGP user's guide
  • [3] Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things
    Bradbury, Matthew
    Jhumka, Arshad
    Watson, Tim
    Flores, Denys
    Burton, Jonathan
    Butler, Matthew
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (02)
  • [4] Trust Trackers for Computation Offloading in Edge-Based IoT Networks
    Bradbury, Matthew
    Jhumka, Arshad
    Watson, Tim
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [5] SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
    Clark, Jeremy
    van Oorschot, Paul C.
    [J]. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 511 - 525
  • [6] Commerce B.E., 2002, 15 BLED EL COMM C
  • [7] Conchie Stacey, 2022, CREST SECURITY R SUM, P4
  • [8] Council of European Union, 2014, REG EU 910 2014 EUR
  • [9] Crabtree Andrew, 2021, PRIVACY DESIGN INTER, DOI [10.1049/PBSE014E, DOI 10.1049/PBSE014E]
  • [10] Daubert J, 2015, IEEE INT CONF COMM, P2665, DOI 10.1109/ICCW.2015.7247581