{"title":"Analogy of Trust Models for Information Security","authors":"Priyanka C Hiremath, G. Raju","doi":"10.1109/MPCIT51588.2020.9350428","DOIUrl":null,"url":null,"abstract":"Proper trust management in Information processing and computing environments can significantly assist their widespread adoption. Trust can act as a countermeasure to the several security threats that the information system faces. This paper provides an overview of how trust has been applied in information security. Trust models suggested in contemporary literature for data processing and computing systems are presented. Furthermore, a critical comparison, based on the set of the main characteristics of an appropriate trust management method, is included.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MPCIT51588.2020.9350428","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Proper trust management in Information processing and computing environments can significantly assist their widespread adoption. Trust can act as a countermeasure to the several security threats that the information system faces. This paper provides an overview of how trust has been applied in information security. Trust models suggested in contemporary literature for data processing and computing systems are presented. Furthermore, a critical comparison, based on the set of the main characteristics of an appropriate trust management method, is included.