Managing Trustworthiness in Component-based Embedded Systems

作者: Gabriele Lenzini , Andrew Tokmakoff , Johan Muskens

DOI: 10.1016/J.ENTCS.2006.08.038

关键词:

摘要: Component-based systems use software components to achieve their overall high-level functionality which, in turn, may be extended by initiating the download of new components. This action detrimentally affect system's dependability and security characteristics. We address problem enhancement for component-based embedded that run, example, consumer electronics devices. propose a Trustworthiness Management Framework while acting on behalf (Trustors), supervises existing Trustor-Trustee relationships preserves system level security. is achieved monitoring quality metrics behaviours, periodically evaluating trustworthiness, (when applicable) controlling them. paper focuses trustworthiness evaluation process offered Framework. seen as Trustors-parameterisable function. expressed with triple values: compliance, benignity stability. The first measures degree which component satisfies Trustor's requirement; second third express expected belief that, resp., will continue compliant component's behavioural qualities remain stable. used Manager make control decisions regulate Keywords: systems, evaluation, management architecture,

参考文章(15)
Audun Jøsang, Michael Kinateder, Elizabeth Gray, Simplification and analysis of transitive trust networks Web Intelligence and Agent Systems: An International Journal. ,vol. 4, pp. 139- 161 ,(2006)
Peter Herrmann, Trust-Based Protection of Software Component Users and Designers Lecture Notes in Computer Science. pp. 75- 90 ,(2003) , 10.1007/3-540-44875-6_6
M. Chaudron, J. Muskens, Integrity management in component based systems Proceedings. 30th Euromicro Conference, 2004.. pp. 611- 619 ,(2004) , 10.1109/EUROMICRO.2004.42
Wanita Sherchan, Seng W. Loke, Shonali Krishnaswamy, A fuzzy model for reasoning about reputation in web services acm symposium on applied computing. pp. 1886- 1892 ,(2006) , 10.1145/1141277.1141722
Elbert A. Walker, Hung T. Nguyen, A first course in fuzzy logic ,(1996)
Anurag Acharya, Mandar Raje, MAPbox: using parameterized behavior classes to confine untrusted applications usenix security symposium. pp. 1- 1 ,(2000)
Audun Jøsang, Roslan Ismail, Colin Boyd, A survey of trust and reputation systems for online service provision decision support systems. ,vol. 43, pp. 618- 644 ,(2007) , 10.1016/J.DSS.2005.05.019
Audun JØsang, A Subjective Metric of Authentication european symposium on research in computer security. pp. 329- 344 ,(1998) , 10.1007/BFB0055873
AUDUN JØSANG, A logic for uncertain probabilities International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. ,vol. 9, pp. 279- 311 ,(2001) , 10.1142/S0218488501000831
Gabriele Lenzini, Santtu Toivonen, Ilkka Uusitalo, Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems MTW. ,(2006)