An architectural approach for assessing system trust based on security policy specifications and security mechanisms

Şerif Bahtiyar*, Murat Cihan, Mehmet Ufuk Çaǧlayan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

We investigate trust relationships between and within a security policy and a security mechanism to assess system trust of software application. It has been recognized that trust assessment of security systems in dynamic environments with multiple entities, each with its own changing needs from the security mechanisms, is a complex task. In this paper, we propose a novel architectural approach to assess system trust of service oriented environments. The primary goal of this architecture is to show a way for constructing an automated system for trust assessment of web services. Particularly, we consider beliefs of an entity about a speci.c security mechanism of a service and the behavior of the service. In addition, we present new trust metrics for assessing system trust of a web service. Furthermore, trust and trust related issues in literature are reviewed to make clear the pros of our approach for trust assessment.

Original languageEnglish
Title of host publicationSIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks
Pages71-74
Number of pages4
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2nd International Conference on Security of Information and Networks, SIN'09 - Famagusta, Cyprus
Duration: 6 Oct 200910 Oct 2009

Publication series

NameSIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks

Conference

Conference2nd International Conference on Security of Information and Networks, SIN'09
Country/TerritoryCyprus
CityFamagusta
Period6/10/0910/10/09

Keywords

  • Assessment
  • Trust

Fingerprint

Dive into the research topics of 'An architectural approach for assessing system trust based on security policy specifications and security mechanisms'. Together they form a unique fingerprint.

Cite this