2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00213
|View full text |Cite
|
Sign up to set email alerts
|

Towards Trustworthy Information Sharing by Creating Cyber Security Alliances

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…To form a security alliance, trust among the members needs to be organised, maintained and measured. Deljoo et al [4] define trust in the alliance as follows: "a trustor expects a trustee to perform task t and the trustee will not exploit vulnerabilities of the trustor when the trustee is faced with the opportunity to do so." Therefore, every trustee:…”
Section: Trust In Security Alliancesmentioning
confidence: 99%
See 2 more Smart Citations
“…To form a security alliance, trust among the members needs to be organised, maintained and measured. Deljoo et al [4] define trust in the alliance as follows: "a trustor expects a trustee to perform task t and the trustee will not exploit vulnerabilities of the trustor when the trustee is faced with the opportunity to do so." Therefore, every trustee:…”
Section: Trust In Security Alliancesmentioning
confidence: 99%
“…Every collaboration comes with a risk that needs to be minimised. Das et al, [6] defined the relational and performance risks as two distinct risks for the alliance, and Deljoo et al [4] present the risk evaluation framework for the security alliance. Relational risk concerns the behaviour of the alliance members, 1 − Ben(l, r), while the performance risk considers the competence of members to perform the given task, 1−Comp(l, r, t).…”
Section: Riskmentioning
confidence: 99%
See 1 more Smart Citation
“…• the effective contribution of private persons to formal computer emergency response arrangements, e.g., crowdsourcing, requires recognition and division based on the roles and individual needs and can encourage 'netizens' to co-produce cybersecurity [24]; • trust is key for sharing cyber intelligence and motivating partners to join a cybersecurity alliance [25]; • the timely identification, management and resolution of conflicts among partner organisations is key for successful collaboration [26]; • traditional assessments of security risks often focus on tangible assets, while intangibles such as tacit knowledge are in some cases more important than physical assets [27]; • knowledge sharing is a fundamental factor for strategic decision making, particularly in relation to innovation management and sustainability of collaborative organisations [28]; •…”
Section: Introductionmentioning
confidence: 99%
“…A key requirement for knowledge sharing is how actors can share information without jeopardizing their own operation. Similarly, the amount of data transmission is quickly growing, and reliability becomes more and more important [13].…”
Section: Introductionmentioning
confidence: 99%