Estimating the relative trustworthiness of information sources in security solution evaluation

  • Authors:
  • Siv Hilde Houmb;Indrakshi Ray;Indrajit Ray

  • Affiliations:
  • Department of Computer Science, Norwegian University of Science and Technology, Trondheim, Norway;Computer Science Department, Colorado State University, Fort Collins, CO;Computer Science Department, Colorado State University, Fort Collins, CO

  • Venue:
  • iTrust'06 Proceedings of the 4th international conference on Trust Management
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

When evaluating alternative security solutions, such as security mechanism, security protocols etc., “hard” data or information is rarely available, and one have to relay on the opinions of domain experts. Log-files from IDS, Firewalls and honeypots might also be used. However, such source are most often only used in an “penetrate and patch” strategy, meaning that system administrators, security experts or similar surveillance the network and initiate appropriate reactions to the actions observed. Such sources refers to real-time information, but might also be used in a more preventive manner by combining it with the opinions provided by the domain experts. To appropriately combine the information from such various sources the notion of trust is used. Trust represents the degree to which a particular information source can be trusted to provide accurate and correct information, and is measured as information source relative trustworthiness. In this paper we show how to assign this relative trustworthiness using two trust variables; (1) knowledge level and (2) level of expertise.