Beyond proof-of-compliance: security analysis in trust management

2005 ◽  
Vol 52 (3) ◽  
pp. 474-514 ◽  
Author(s):  
Ninghui Li ◽  
John C. Mitchell ◽  
William H. Winsborough
First Monday ◽  
2006 ◽  
Author(s):  
Rohit Khare ◽  
Adam Rifkin

This paper is included in the First Monday Special Issue: Commercial Applications of the Internet, published in July 2006. For author reflections on this paper, visit the Special Issue. As once-proprietary mission-specific information systems migrate onto the Web, traditional security analysis cannot sufficiently protect each subsystem atomically. The Web encourages open, decentralized systems that span multiple administrative domains. Trust Management (TM) is an emerging framework for decentralizing security decisions that helps developers and others in asking "why" trust is granted rather than immediately focusing on "how" cryptography can enforce it. In this paper, we recap the basic elements of Trust Management: principles, principals, and policies. We present pragmatic details of Web-based TM technology for identifying principals, labeling resources, and enforcing policies. We sketch how TM might be integrated into Web applications for document authoring and distribution, content filtering, and mobile code security. Finally, we measure today's Web protocols, servers, and clients against this model, culminating in a call for stakeholders' support in bringing automatable TM to the Web.


2018 ◽  
Vol 15 (2) ◽  
pp. 47-66
Author(s):  
Prashant Kumar ◽  
Naveen Chauhan ◽  
Narottam Chand ◽  
Lalit K. Awasthi

Opportunistic networks are the special class of ad hoc networks where permanent link among the nodes are almost absent and communication occurs when an “opportunity” is found. The opportunistic networks have more diverse features than traditional ad hoc networks, like self-organized nature, intermittent connectivity, store-carry-forward routing mechanism, etc. All these features make opportunistic networks more prone to security threats. This article discusses security challenges and threats to opportunistic networks. Focusing on the specific security requirements of opportunistic networks, proposed is a secure framework for authentication and privacy preservation (SF-APP) for opportunistic networks. The proposed algorithm takes care of authentication, privacy preservation, and trust management. Within this article is a performed security analysis of SF-APP and simulation results show that the proposed framework is capable of fulfilling the security requirements of opportunistic networks.


2007 ◽  
Author(s):  
Mark G. Reith ◽  
Jianwei Niu ◽  
William H. Winsborough

2021 ◽  
Vol 16 (6) ◽  
pp. 2405-2423
Author(s):  
Muhammad Waleed ◽  
Rabia Latif ◽  
Bello Musa Yakubu ◽  
Majid Iqbal Khan ◽  
Seemab Latif

With the innovation of embedded devices, the concept of smart marketplace came into existence. A smart marketplace is a platform on which participants can trade multiple resources, such as water, energy, bandwidth. Trust is an important factor in the trading platform, as the participants would prefer to trade with those peers who have a high trust rating. Most of the existing trust management models for smart marketplace only provide a single aggregated trust score for a participant. However, they lack the mechanism to gauge the level of commitment shown by a participant while trading a particular resource. This work aims to provide a fine-grained trust score for a participant with respect to each resource that it trades. Several parameters, such as resource availability, success rate, and turnaround time are used to gauge the participant’s level of commitment, specific to the resource being traded. Moreover, the effectiveness of the proposed model is validated through security analysis against ballot-stuffing and bad-mouthing attacks, along with simulationbased analysis and a comparison in terms of accuracy, false positive, false negative, computational cost and latency. The results indicate that the proposed trust model has 7% better accuracy, 30.13% lower computational cost and 31.74% less latency compared to the existing benchmark model.


Author(s):  
Yu.M. Sklyarova ◽  
I.Yu. Sklyarov ◽  
E.N. Lapina

2020 ◽  
Vol 10 (5) ◽  
pp. 43-49
Author(s):  
MARINA MARKHGEYM ◽  
◽  
ANNA BEZUGLAYA

The article presents the author’s analysis of constitutional texts, regulations and analytical materials of the countries of the Commonwealth of Independent States in order to consolidate in them the consolidated powers of the chambers of parliaments associated with the implementation of food security. Analysis of legal acts of the studied group of states showed that the sphere of food security (as part of the agrarian and food sphere/function) is one of the eventual spheres of interaction between the chambers of parliament. In the course of the study, two approaches of states to the formalization of provisions related to food security in constitutional texts were identified. The first approach is to consolidate norms that indirectly affect the field of food security (Belarus, Kazakhstan, Russia); the second - in the absence of such provisions (Tajikistan and Uzbekistan). It has been established that the interaction of the chambers of parliaments in the field of food security is implemented through the adoption of laws, as well as through various parliamentary events (parliamentary hearings, round tables, seminars, meetings, etc.). It is concluded that the available options for interaction between the chambers of parliaments of states in the field of food security reflect their independent approaches, which are developed on the basis of legal doctrine and practice.


Sign in / Sign up

Export Citation Format

Share Document