首页> 外文会议>Annual Meeting of the Institute of Nuclear Materials Management >Trust Models in Information Systems Security - A Survey
【24h】

Trust Models in Information Systems Security - A Survey

机译:信息系统安全中的信任模型综述

获取原文
获取外文期刊封面目录资料

摘要

As we move towards a data-centric world with shifting threats and perimeters that threatens the realization ol network security goals such as availability, integrity, confidentiality, authentication, authorization, privacy, non-repudiation ol senices and oilier hard security issues, it has become expedient to shilt paradigm in the way trust is established and authenticated. Trust is a subjective human beliel. ft is one the most essential means to improve security and enable interoperability in existing heterogeneous information ecosystem architecture. Trust models are used widely in information systems with the purpose of measuring the trustworthiness of a set of entities based on their behaviours. Today's enterprises are open and competitive and relies on distributed infrastructure across various geo-spatial location and various cyber-physical locations in order to oiler seamless and effective services to clients. With attendant increasing digitization and decentralization ol information technology (IT) and information and control systems (ICS) especially in nuclear installations and associated facilities distributed computing lrameworks are becoming more vulnerable to attacks from malicious agents, masquerading as trusted agents, thereby increasing die chances of risks and security compromises. This necessitates a belter understanding ol trust models used in computing, as trust and reputation management system are tools to mitigate security threats and vulnerabilities. This paper presents a precise and condensed survey ol selected trust models used in information systems. The attributes of trust needed lor enterprise information systems and networks are identified with the aim ol identifying trust characteristics in each model.
机译:随着我们走向一个以数据为中心的世界,不断变化的威胁和周长威胁着网络安全目标的实现,如可用性、完整性、机密性、身份验证、授权、隐私、不可抵赖性和更复杂的硬安全问题,在建立信任和身份验证的方式上采用shilt范式已成为一种权宜之计。信任是一种主观的人类信念。ft是在现有异构信息生态系统架构中提高安全性和实现互操作性的最基本手段之一。信任模型广泛应用于信息系统中,其目的是根据一组实体的行为来衡量它们的可信度。今天的企业是开放的、有竞争力的,它们依赖于分布在不同地理空间位置和不同网络物理位置的分布式基础设施,以便为客户提供无缝和有效的服务。随着信息技术(IT)和信息与控制系统(ICS)的数字化和分散化程度不断提高,尤其是在核设施和相关设施中,分布式计算系统越来越容易受到伪装成可信代理的恶意代理的攻击,从而增加了风险和安全隐患的死亡几率。这就需要更好地理解计算中使用的信任模型,因为信任和声誉管理系统是缓解安全威胁和漏洞的工具。本文对信息系统中的信任模型进行了精确而简明的综述。识别企业信息系统和网络所需的信任属性,目的是识别每个模型中的信任特征。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号