Computer Science &Amp; Information Technology ( CS &Amp; IT ) 2014
DOI: 10.5121/csit.2014.4212
|View full text |Cite
|
Sign up to set email alerts
|

An Explicit Trust Model Towards Better System Security

Abstract: Trust is an absolute necessity for digital communications; but is often viewed as an implicit singular entity. The use of the internet as the primary vehicle for information exchange has made accountability and verifiability of system code almost obsolete. This paper proposes a novel approach towards enforcing system security by requiring the explicit definition of trust for all operating code. By identifying the various classes and levels of trust required within a computing system; trust is defined as a comb… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…To validate this section, the questionnaire was adapted from [60], where the average Cronbach"s alpha value of 0.88 reflects good internal consistency. The confidentiality of the respondents was ensured through not taking any personally identifiable information because it is realized that people's consciousness can also influence their honesty and introduces prestige bias [23]. Also, the identities were not important for the results and do not serve any purpose.…”
Section: Data Analysis and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…To validate this section, the questionnaire was adapted from [60], where the average Cronbach"s alpha value of 0.88 reflects good internal consistency. The confidentiality of the respondents was ensured through not taking any personally identifiable information because it is realized that people's consciousness can also influence their honesty and introduces prestige bias [23]. Also, the identities were not important for the results and do not serve any purpose.…”
Section: Data Analysis and Resultsmentioning
confidence: 99%
“…Further, teens are usually non-persistent in their behavior which may vary with their daily mood swings [23]. Therefore, in order to interpret their true nature, the model should keep track of their general activities, habits, and behaviors over a longer period of time [23], rather than disclosing them to others after a couple of interactions.…”
Section: ) Non-persistencementioning
confidence: 99%