Visible to the public Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust

TitleEngineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust
Publication TypeConference Paper
Year of Publication2018
AuthorsTucker, Scot
Conference Name2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
KeywordsCognition, complex intersystem trust relationships, complex multitiered system architectures, Component architectures, composability, compositionality, Computational modeling, Computing Theory and Trust, disparate system, engineering trust, evaluation, graph theory, graph-based algorithm, graph-based modeling methodology, Measurement, Metrics, Modeling, psychology, pubcrawl, requirements analysis, risk, security of data, system engineering, Systems architecture, Systems Engineering, systems engineering processes, Trust, Trust management, trust modeling, Trusted Computing, Vulnerability
AbstractTrust is an important topic in today's interconnected world. Breaches of trust in today's systems has had profound effects upon us all, and they are very difficult and costly to fix especially when caused by flaws in the system's architecture. Trust modeling can expose these types of issues, but modeling trust in complex multi-tiered system architectures can be very difficult. Often experts have differing views of trust and how it applies to systems within their domain. This work presents a graph-based modeling methodology that normalizes the application of trust across disparate system domains allowing the modeling of complex intersystem trust relationships. An algorithm is proposed that applies graph theory to model, validate and evaluate trust in system architectures. Also, it provides the means to apply metrics to compare and prioritize the effectiveness of trust management in system and component architectures. The results produced by the algorithm can be used in conjunction with systems engineering processes to ensure both trust and the efficient use of resources.
DOI10.1109/TrustCom/BigDataSE.2018.00011
Citation Keytucker_engineering_2018