Home > Research > Publications & Outputs > Attributes and Dimensions of Trust in Secure Sy...

Electronic data

  • main

    Accepted author manuscript, 512 KB, PDF document

View graph of relations

Attributes and Dimensions of Trust in Secure Systems

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Forthcoming

Standard

Attributes and Dimensions of Trust in Secure Systems. / Bradbury, Matthew; Prince, Daniel; Marcinkiewicz, Victoria et al.
STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands, 2022. (ACM Transactions on Internet of Things).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Bradbury, M, Prince, D, Marcinkiewicz, V & Watson, T 2022, Attributes and Dimensions of Trust in Secure Systems. in STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. ACM Transactions on Internet of Things, Delft, Netherlands.

APA

Bradbury, M., Prince, D., Marcinkiewicz, V., & Watson, T. (in press). Attributes and Dimensions of Trust in Secure Systems. In STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things (ACM Transactions on Internet of Things)..

Vancouver

Bradbury M, Prince D, Marcinkiewicz V, Watson T. Attributes and Dimensions of Trust in Secure Systems. In STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands. 2022. (ACM Transactions on Internet of Things).

Author

Bradbury, Matthew ; Prince, Daniel ; Marcinkiewicz, Victoria et al. / Attributes and Dimensions of Trust in Secure Systems. STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands, 2022. (ACM Transactions on Internet of Things).

Bibtex

@inproceedings{461f6fe599a04489985c74021ae4d897,
title = "Attributes and Dimensions of Trust in Secure Systems",
abstract = "What is it to be trusted? This is an important question as trust is increasingly placed in a system and the degree to which a system is trusted is increasingly being assessed. However, there are issues with how related terms are used. Many definitions focus on one attribute of trust (typically behaviour) preventing that definition from being used for other attributes (e.g., identity). This is confused further by conflating what trustors measure about a trustee and what conclusions a trustor reaches about a trustee. Therefore, in this paper we present definitions of measures (trustiness and trustworthiness) and conclusions (trusted and trustworthy). These definitions are general and do not refer to a specific attribute allowing them to be used with arbitrary attributes which are being assessed (e.g., identity, behaviour, limitation, execution, correctness, data, environment). In addition, in order to demonstrate the complexities of describing if a trustee is designated as trusted or trustworthy, a set of dimensions are defined to describe attributes (time, scale, proactive/reactive, strength, scope, source). Finally, an example system is classified using these attributes and their dimensions in order to highlight the complexities of describing a system as holistically trusted or trustworthy.",
author = "Matthew Bradbury and Daniel Prince and Victoria Marcinkiewicz and Tim Watson",
year = "2022",
month = oct,
day = "7",
language = "English",
series = "ACM Transactions on Internet of Things",
booktitle = "STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things",

}

RIS

TY - GEN

T1 - Attributes and Dimensions of Trust in Secure Systems

AU - Bradbury, Matthew

AU - Prince, Daniel

AU - Marcinkiewicz, Victoria

AU - Watson, Tim

PY - 2022/10/7

Y1 - 2022/10/7

N2 - What is it to be trusted? This is an important question as trust is increasingly placed in a system and the degree to which a system is trusted is increasingly being assessed. However, there are issues with how related terms are used. Many definitions focus on one attribute of trust (typically behaviour) preventing that definition from being used for other attributes (e.g., identity). This is confused further by conflating what trustors measure about a trustee and what conclusions a trustor reaches about a trustee. Therefore, in this paper we present definitions of measures (trustiness and trustworthiness) and conclusions (trusted and trustworthy). These definitions are general and do not refer to a specific attribute allowing them to be used with arbitrary attributes which are being assessed (e.g., identity, behaviour, limitation, execution, correctness, data, environment). In addition, in order to demonstrate the complexities of describing if a trustee is designated as trusted or trustworthy, a set of dimensions are defined to describe attributes (time, scale, proactive/reactive, strength, scope, source). Finally, an example system is classified using these attributes and their dimensions in order to highlight the complexities of describing a system as holistically trusted or trustworthy.

AB - What is it to be trusted? This is an important question as trust is increasingly placed in a system and the degree to which a system is trusted is increasingly being assessed. However, there are issues with how related terms are used. Many definitions focus on one attribute of trust (typically behaviour) preventing that definition from being used for other attributes (e.g., identity). This is confused further by conflating what trustors measure about a trustee and what conclusions a trustor reaches about a trustee. Therefore, in this paper we present definitions of measures (trustiness and trustworthiness) and conclusions (trusted and trustworthy). These definitions are general and do not refer to a specific attribute allowing them to be used with arbitrary attributes which are being assessed (e.g., identity, behaviour, limitation, execution, correctness, data, environment). In addition, in order to demonstrate the complexities of describing if a trustee is designated as trusted or trustworthy, a set of dimensions are defined to describe attributes (time, scale, proactive/reactive, strength, scope, source). Finally, an example system is classified using these attributes and their dimensions in order to highlight the complexities of describing a system as holistically trusted or trustworthy.

M3 - Conference contribution/Paper

T3 - ACM Transactions on Internet of Things

BT - STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things

CY - Delft, Netherlands

ER -