2013 IEEE Third International Conference on Information Science and Technology (ICIST) 2013
DOI: 10.1109/icist.2013.6747559
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy for securely sharing information among others in a trust domain

Abstract: In any given collaboration, information needs to flow from one participant to another. While participants may be interested in sharing information with one another, it is often necessary for them to establish the impact of sharing certain kinds of information. This is because certain information could have detrimental effects when it ends up in wrong hands. For this reason, any would-be participant in a collaboration may need to establish the guarantees that the collaboration provides, in terms of protecting s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…As people's reliance on the Internet grows, so the possibility of hacking and other security breaches increases regularly (Liang & Xue, 2010). Computer users play a major role in helping to make cyberspace a safer place for everyone (Arachchilage, Namiluko, & Martin, 2013). This paper focuses on how the human aspect of security can be influenced to avoid cyberthreats in the computer use.…”
Section: Introductionmentioning
confidence: 99%
“…As people's reliance on the Internet grows, so the possibility of hacking and other security breaches increases regularly (Liang & Xue, 2010). Computer users play a major role in helping to make cyberspace a safer place for everyone (Arachchilage, Namiluko, & Martin, 2013). This paper focuses on how the human aspect of security can be influenced to avoid cyberthreats in the computer use.…”
Section: Introductionmentioning
confidence: 99%
“…Identifying the membership criteria for any information sharing effort helps to build transparency and trust from day one. Trust taxonomies have been widely investigated, such as for P2P systems, for instance [18][19][20][21], to establish both centralized and decentralized secure environments. Moreover, the 5x5x5 scheme (the 5x5x5 scheme evaluates intelligence in 3 areas: source, data validity, and sensitivity; each evaluation has 5 possible types of grading) and Admiralty Code (the Admiralty Code evaluates the reliability of the source and the confidence in the information) have appeared in recent platforms to evaluate intelligence.…”
Section: Trust Taxonomymentioning
confidence: 99%
“…The missing control of the authenticity of the rating is a limitation in our model. A taxonomy was presented in "A Taxonomy for Securely Sharing Information among Others in a Trusted Domain" (2013) [21]. The taxonomy presents a decentralized trusted environment for information sharing.…”
Section: Activity Description Very Activementioning
confidence: 99%
“…Information is a principal asset of organizations and requires protection. It is crucial for organizations to secure all IS assets due to possible malicious attacks and unauthorized use of access [26]. Protection of the whole IS assets is the form of anxiety because it brings significant impacts on sustainability of organizational activities, and develops and implements system [27].…”
Section: Theoretical Backgroundmentioning
confidence: 99%