Projects per year
Abstract
In this deliverable, we present the work done on Trust and Trustworthiness models during the phase after the D2.2 milestone. We focussed our efforts mainly on the validation and evaluation of these models, and the application and integration of these models into the use cases within OPTET (DADV, ALL and SWC).
The primary focus of the Trustworthiness Model was to make these models both useful and usable. These were made primary considerations after taking on board the comments from the first review and various Advisory Board meetings. Based on these considerations, a set of Generic Enablers were developed which allow system designers to easily compose trustworthy and secure abstract models of systems and perform risk analysis on the assets within their socio-technical system. This is because we measure trustworthiness of a system in terms of the risks to the assets within the system, and this involves the analysis of threats to the assets and their mitigation measures. Next, we focus on the application and integration of the trustworthiness models into all three OPTET use cases. The primary validation criteria we considered for the trustworthiness models were in terms of design, threat coverage and run-time integration.
The Trust computational model was revisited and an examination on how different trust-related user experiences are guided by different sets of trustor's attributes, thereby keeping especially the objective in mind (T2.1) to explore the linkage of socio-economic and legal components was performed. A full and real-time trust evaluation experiment with users based on the DADV (Distributed Attack Detection and Visualisation) scenario was performed during this phase of the project. The results of these experiments are documented in detail as part of this
The primary focus of the Trustworthiness Model was to make these models both useful and usable. These were made primary considerations after taking on board the comments from the first review and various Advisory Board meetings. Based on these considerations, a set of Generic Enablers were developed which allow system designers to easily compose trustworthy and secure abstract models of systems and perform risk analysis on the assets within their socio-technical system. This is because we measure trustworthiness of a system in terms of the risks to the assets within the system, and this involves the analysis of threats to the assets and their mitigation measures. Next, we focus on the application and integration of the trustworthiness models into all three OPTET use cases. The primary validation criteria we considered for the trustworthiness models were in terms of design, threat coverage and run-time integration.
The Trust computational model was revisited and an examination on how different trust-related user experiences are guided by different sets of trustor's attributes, thereby keeping especially the objective in mind (T2.1) to explore the linkage of socio-economic and legal components was performed. A full and real-time trust evaluation experiment with users based on the DADV (Distributed Attack Detection and Visualisation) scenario was performed during this phase of the project. The results of these experiments are documented in detail as part of this
Original language | English |
---|---|
Publisher | Unknown |
Publication status | Published - 22 Oct 2014 |
Keywords
- trust
- computation model
- cyber crisis management
Fingerprint
Dive into the research topics of 'Socio-economic evaluation of trust and trustworthiness'. Together they form a unique fingerprint.Projects
- 1 Finished