{"title":"协同异常信任化解入侵能力","authors":"Khalil A. Abuosba, C. Martin","doi":"10.1109/WETICE.2008.32","DOIUrl":null,"url":null,"abstract":"From a computer security perspective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative anomalous trust management (CATM) is a methodology that may be utilized for the purpose of affirming trust between communications endpoints. In conjunction with trusted computing base, zero knowledge protocol, and layered trust, CATM is defined. CATM builds its trust credentials based on computing environment variables. Ideally this methodology is suited for service oriented architectures such as Web services where service providers and consumers interact at different levels of security requirements. This methodology is best optimized for use as a risk management utility. In this approach vulnerabilities are implicitly reduced, hence intrusion capabilities are defused.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Defusing Intrusion Capabilities by Collaborative Anomalous Trust\",\"authors\":\"Khalil A. Abuosba, C. Martin\",\"doi\":\"10.1109/WETICE.2008.32\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"From a computer security perspective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative anomalous trust management (CATM) is a methodology that may be utilized for the purpose of affirming trust between communications endpoints. In conjunction with trusted computing base, zero knowledge protocol, and layered trust, CATM is defined. CATM builds its trust credentials based on computing environment variables. Ideally this methodology is suited for service oriented architectures such as Web services where service providers and consumers interact at different levels of security requirements. This methodology is best optimized for use as a risk management utility. In this approach vulnerabilities are implicitly reduced, hence intrusion capabilities are defused.\",\"PeriodicalId\":259447,\"journal\":{\"name\":\"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WETICE.2008.32\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WETICE.2008.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defusing Intrusion Capabilities by Collaborative Anomalous Trust
From a computer security perspective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative anomalous trust management (CATM) is a methodology that may be utilized for the purpose of affirming trust between communications endpoints. In conjunction with trusted computing base, zero knowledge protocol, and layered trust, CATM is defined. CATM builds its trust credentials based on computing environment variables. Ideally this methodology is suited for service oriented architectures such as Web services where service providers and consumers interact at different levels of security requirements. This methodology is best optimized for use as a risk management utility. In this approach vulnerabilities are implicitly reduced, hence intrusion capabilities are defused.