{"title":"Trusted Information Exchange Using Trusted Network Processors","authors":"S. Tucker","doi":"10.1145/2897795.2897809","DOIUrl":null,"url":null,"abstract":"Today's systems are increasingly complex consisting of many components designed by multiple competing vendors. Trust management relies heavily on situational awareness of the operating environment, and comprehensive knowledge of components and their relationship to others. Outsourcing and modularity are necessary to reduce cost and increase manageability, but can make it difficult to gather enough information for valid trust decisions. Invalid trust assumptions could lead to vulnerabilities in the future. Furthermore, when components are integrated with information systems these difficulties can increase greatly. This paper presents how trust is applied to information systems, a trust framework based on Trusted Network Processors and an implementation of a trusted information system which allows disjointed component systems to communicate while preserving trust assumptions in a dynamically changing environment.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2897795.2897809","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Today's systems are increasingly complex consisting of many components designed by multiple competing vendors. Trust management relies heavily on situational awareness of the operating environment, and comprehensive knowledge of components and their relationship to others. Outsourcing and modularity are necessary to reduce cost and increase manageability, but can make it difficult to gather enough information for valid trust decisions. Invalid trust assumptions could lead to vulnerabilities in the future. Furthermore, when components are integrated with information systems these difficulties can increase greatly. This paper presents how trust is applied to information systems, a trust framework based on Trusted Network Processors and an implementation of a trusted information system which allows disjointed component systems to communicate while preserving trust assumptions in a dynamically changing environment.