Title | Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Tucker, Scot |
Conference Name | 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) |
Keywords | Cognition, complex intersystem trust relationships, complex multitiered system architectures, Component architectures, composability, compositionality, Computational modeling, Computing Theory and Trust, disparate system, engineering trust, evaluation, graph theory, graph-based algorithm, graph-based modeling methodology, Measurement, Metrics, Modeling, psychology, pubcrawl, requirements analysis, risk, security of data, system engineering, Systems architecture, Systems Engineering, systems engineering processes, Trust, Trust management, trust modeling, Trusted Computing, Vulnerability |
Abstract | Trust is an important topic in today's interconnected world. Breaches of trust in today's systems has had profound effects upon us all, and they are very difficult and costly to fix especially when caused by flaws in the system's architecture. Trust modeling can expose these types of issues, but modeling trust in complex multi-tiered system architectures can be very difficult. Often experts have differing views of trust and how it applies to systems within their domain. This work presents a graph-based modeling methodology that normalizes the application of trust across disparate system domains allowing the modeling of complex intersystem trust relationships. An algorithm is proposed that applies graph theory to model, validate and evaluate trust in system architectures. Also, it provides the means to apply metrics to compare and prioritize the effectiveness of trust management in system and component architectures. The results produced by the algorithm can be used in conjunction with systems engineering processes to ensure both trust and the efficient use of resources. |
DOI | 10.1109/TrustCom/BigDataSE.2018.00011 |
Citation Key | tucker_engineering_2018 |