Martin Kolar

Topic: 
Trustworhy information exchange
Research work: 

The research topic is the design and development of an architecture and methodology for trusted threat intelligence sharing in the context of Security Analytics. The basic idea is to incorporate in our security analytics platform cyber-information coming from externals sources (public and private) in order to anticipate the defenses and be prepared for the attack. It is crucial to take into consideration the trust and reputation of the different sources before applying this information in order to prevent malicious nodes from feeding wrong or misleading info. The assessment of the information has to bear in mind two different types of source provisioning:

  • information is handled by a single provider. In this case it is necessary to assess the trust in the source node because the trust in the information it provides is dependant of it
  • information provided is a compilation of different sources. For this case it is necessary to assess the different data and, therefore, needs to be assessed individually for each data source provider

We also contemplate the provisioning of information, resulting from our analysis and activity, to external sources.

ESRs Publications

Description:

Trust negotiation is a type of trust management model for establishing trust between entities by a mutual exchange of credentials. This approach was designed for online environments, where the attributes of users, such as skills, habits, behaviour and experience are unknown. Required criteria of trust negotiation must be supported by a trust negotiation model in order to provide a functional, adequately robust and efficient application. Such criteria were identified previously. In this paper we are presenting a model specification using a UML-based notation for the design of trust negotiation. This specification will become a part of the Software Development Life Cycle, which will provide developers a strong tool for incorporating trust and trust-related issues into the software they create. The specification defines components and their layout for the provision of the essential functionality of trust negotiation on one side as well as optional, additional features on the other side. The extra features make trust negotiation more robust, applicable for more scenarios and may provide a privacy protection functionality.

Description:

Entities, such as people, companies, institutions, authorities and web sites live and exist in a conjoined world. In order to live and enjoy social benefits, entities need to share knowledge, resources and to cooperate together. The cooperation brings with it many new challenges and problems, among which one is the problem of trust. This area is also important for the Computer Science. When unfamiliar entities wish to cooperate, they do not know what to expect nor whether they can trust each other. Trust negotiation solves this problem by sequential exchanging credentials between entities, which have decided to establish a trust relationship in order to reach a common goal. Entities specify their own policies that handle a disclosure of confidential information to maintain their security and privacy. Policies are defined by means of a policy language. This paper aims to identify the most suitable policy language for trust negotiation. To do so, policy languages are analysed against a set of criteria for trust negotiation that are first established.