{"title":"信息安全信任模型的类比","authors":"Priyanka C Hiremath, G. Raju","doi":"10.1109/MPCIT51588.2020.9350428","DOIUrl":null,"url":null,"abstract":"Proper trust management in Information processing and computing environments can significantly assist their widespread adoption. Trust can act as a countermeasure to the several security threats that the information system faces. This paper provides an overview of how trust has been applied in information security. Trust models suggested in contemporary literature for data processing and computing systems are presented. Furthermore, a critical comparison, based on the set of the main characteristics of an appropriate trust management method, is included.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analogy of Trust Models for Information Security\",\"authors\":\"Priyanka C Hiremath, G. Raju\",\"doi\":\"10.1109/MPCIT51588.2020.9350428\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Proper trust management in Information processing and computing environments can significantly assist their widespread adoption. Trust can act as a countermeasure to the several security threats that the information system faces. This paper provides an overview of how trust has been applied in information security. Trust models suggested in contemporary literature for data processing and computing systems are presented. Furthermore, a critical comparison, based on the set of the main characteristics of an appropriate trust management method, is included.\",\"PeriodicalId\":136514,\"journal\":{\"name\":\"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)\",\"volume\":\"84 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MPCIT51588.2020.9350428\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MPCIT51588.2020.9350428","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proper trust management in Information processing and computing environments can significantly assist their widespread adoption. Trust can act as a countermeasure to the several security threats that the information system faces. This paper provides an overview of how trust has been applied in information security. Trust models suggested in contemporary literature for data processing and computing systems are presented. Furthermore, a critical comparison, based on the set of the main characteristics of an appropriate trust management method, is included.