Abstract
Emergent Business Software is highly dynamic and flexible. Monolithic security solutions cannot secure the service composites that this new paradigm enables. Instead, different security services have to be combined in order to provide flexible security solutions. In this paper, we present two concepts that contribute to securing Emergent Business Applications: reputation-based trust mechanisms and secure data aggregation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bellare M, Rogaway P, Wagner D (2003) Eax: a conventional authenticated-encryption mode. IACR Cryptol ePrint Arch 2003:69
Biau G, Devroye L (2010) On the layered nearest neighbour estimate, the bagged nearest neighbor estimate and the random forest method in regression and classification. J Multivar Anal 101:2499–2518
Breiman L (2001) Random forests. Mach Learn 45:5–32
Breiman L, Friedman JH, Olshen RA, Stone CJ (1984) Classification and regression trees. Technical report, Wadsworth and Brooks/Cole Advanced Books and Software
Burnett C, Norman TJ, Sycara K (2010) Bootstrapping trust evaluations through stereotypes. In: Proceedings of 9th international conference on autonomous agents and multiagent systems, pp 241–248
Castelfranchi C, Falcone R (2000) Trust is much more than subjective probability: mental components and sources of trust. In: Proceedings of the 33rd annual Hawaii international conference on system sciences
Dinkelaker T, Eichberg M, Mezini M (2011) Incremental concrete syntax for embedded languages. In: Proceedings of the 2011 ACM symposium on applied computing, SAC ‘11, New York, NY, USA, pp 1309–1316
Gambetta Diego (1988) Can We Trust Trust? In: Gambetta D (ed) Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213–237
Habib SM, Ries S, Hauke S, Mühlhäuser M (2012) Fusion of opinions under uncertainty and conflict—trust assessment for cloud marketplaces. In: Proceedings of IEEE TrustCom-12
Hauke S, Volk F, Habib SM, Mühlhäuser M (2012) Integrating indicators of trustworthiness into reputation-based trust models. In: Proceedings of the 6th IFIP WG 11.11 international conference, IFIPTM 2012
Hauke S, Biedermann S, Mühlhäuser M, Heider D (2013) On the application of supervised machine learning to trustworthiness assessment. Technical Report TUD-CS-2013-0050, TR-014, Technische Universität Darmstadt
Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K (2000) System architecture directions for networked sensors. In: Proceedings of the 9th international conference on Architectural support for programming languages and operating systems, ASPLOS IX, New York, NY, USA, pp 93–104. ACM
Jøsang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference
Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644
Liu X, Trédan G, Datta A (2011) A generic trust framework for large-scale open systems using machine learning. CoRR, abs/1103.0086
Magin S (2013) Engineering a trust management system: a flexible, component-based approach. Master’s thesis, TU Darmstadt
Malley JD, Kruppa J, Dasgupta A, Malley KG, Ziegler A (2012) Probability machines: consistent probability estimation using nonparametric learning machines. Methods Inf Med 51(1):74–81
Ozdemir S, Xiao Y (2009) Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput Netw 53:2022–2037
Quinlan JR (1992) Learning with continuous classes. In: Proceedings AI, pp 343–348
Ries S (2009) Extending bayesian trust models regarding context-dependence and user friendly representation. In: Proceedings of the 2009 ACM Symposium on applied computing, New York, USA, pp 1294–1301
Ries S, Habib SM, Mühlhäuser M, Varadharajan V (2011) CertainLogic: a logic for modeling trust and uncertainty (Short Paper). In: Proceedings of the 4th international conference on trust and trustworthy computing (TRUST 2011). Springer
Shafer G (1976) A mathematical theory of evidence. Princeton University Press, Princeton
Sutton RS, Barto AG (1998) Reinforcement learning: an introduction. MIT Press, Cambridge, MA
Wang Y, Singh MP (2010) Evidence-based trust: a mathematical model geared for multiagent systems. ACM Trans Auton Adapt Syst (TAAS) 5(4):14
Wang Y, Vassileva J (2007) Toward trust and reputation based web service selection: a survey. Int Trans Syst Sci Appl 3(2):118–132
Yan Z, Prehofer C (2011) Autonomic trust management for a component-based software system. IEEE Trans Dependable Secure Comput 8(6):810–823
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Bansarkhani, R.E., Hauke, S., Buchmann, J. (2014). Towards Security Solutions for Emergent Business Software. In: Brunetti, G., Feld, T., Heuser, L., Schnitter, J., Webel, C. (eds) Future Business Software. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-319-04144-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-04144-5_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04143-8
Online ISBN: 978-3-319-04144-5
eBook Packages: Computer ScienceComputer Science (R0)