Skip to main content

Towards Security Solutions for Emergent Business Software

  • Conference paper
  • First Online:
Future Business Software

Part of the book series: Progress in IS ((PROIS))

  • 2223 Accesses

Abstract

Emergent Business Software is highly dynamic and flexible. Monolithic security solutions cannot secure the service composites that this new paradigm enables. Instead, different security services have to be combined in order to provide flexible security solutions. In this paper, we present two concepts that contribute to securing Emergent Business Applications: reputation-based trust mechanisms and secure data aggregation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We present a basic version here; (Jøsang and Ismail 2002; Ries 2009) allow for a further parameterisation of the prediction model.

References

  • Bellare M, Rogaway P, Wagner D (2003) Eax: a conventional authenticated-encryption mode. IACR Cryptol ePrint Arch 2003:69

    Google Scholar 

  • Biau G, Devroye L (2010) On the layered nearest neighbour estimate, the bagged nearest neighbor estimate and the random forest method in regression and classification. J Multivar Anal 101:2499–2518

    Article  MATH  MathSciNet  Google Scholar 

  • Breiman L (2001) Random forests. Mach Learn 45:5–32

    Article  MATH  Google Scholar 

  • Breiman L, Friedman JH, Olshen RA, Stone CJ (1984) Classification and regression trees. Technical report, Wadsworth and Brooks/Cole Advanced Books and Software

    Google Scholar 

  • Burnett C, Norman TJ, Sycara K (2010) Bootstrapping trust evaluations through stereotypes. In: Proceedings of 9th international conference on autonomous agents and multiagent systems, pp 241–248

    Google Scholar 

  • Castelfranchi C, Falcone R (2000) Trust is much more than subjective probability: mental components and sources of trust. In: Proceedings of the 33rd annual Hawaii international conference on system sciences

    Google Scholar 

  • Dinkelaker T, Eichberg M, Mezini M (2011) Incremental concrete syntax for embedded languages. In: Proceedings of the 2011 ACM symposium on applied computing, SAC ‘11, New York, NY, USA, pp 1309–1316

    Google Scholar 

  • Gambetta Diego (1988) Can We Trust Trust? In: Gambetta D (ed) Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213–237

    Google Scholar 

  • Habib SM, Ries S, Hauke S, Mühlhäuser M (2012) Fusion of opinions under uncertainty and conflict—trust assessment for cloud marketplaces. In: Proceedings of IEEE TrustCom-12

    Google Scholar 

  • Hauke S, Volk F, Habib SM, Mühlhäuser M (2012) Integrating indicators of trustworthiness into reputation-based trust models. In: Proceedings of the 6th IFIP WG 11.11 international conference, IFIPTM 2012

    Google Scholar 

  • Hauke S, Biedermann S, Mühlhäuser M, Heider D (2013) On the application of supervised machine learning to trustworthiness assessment. Technical Report TUD-CS-2013-0050, TR-014, Technische Universität Darmstadt

    Google Scholar 

  • Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K (2000) System architecture directions for networked sensors. In: Proceedings of the 9th international conference on Architectural support for programming languages and operating systems, ASPLOS IX, New York, NY, USA, pp 93–104. ACM

    Google Scholar 

  • Jøsang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference

    Google Scholar 

  • Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644

    Article  Google Scholar 

  • Liu X, Trédan G, Datta A (2011) A generic trust framework for large-scale open systems using machine learning. CoRR, abs/1103.0086

    Google Scholar 

  • Magin S (2013) Engineering a trust management system: a flexible, component-based approach. Master’s thesis, TU Darmstadt

    Google Scholar 

  • Malley JD, Kruppa J, Dasgupta A, Malley KG, Ziegler A (2012) Probability machines: consistent probability estimation using nonparametric learning machines. Methods Inf Med 51(1):74–81

    Article  Google Scholar 

  • Ozdemir S, Xiao Y (2009) Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput Netw 53:2022–2037

    Article  MATH  Google Scholar 

  • Quinlan JR (1992) Learning with continuous classes. In: Proceedings AI, pp 343–348

    Google Scholar 

  • Ries S (2009) Extending bayesian trust models regarding context-dependence and user friendly representation. In: Proceedings of the 2009 ACM Symposium on applied computing, New York, USA, pp 1294–1301

    Google Scholar 

  • Ries S, Habib SM, Mühlhäuser M, Varadharajan V (2011) CertainLogic: a logic for modeling trust and uncertainty (Short Paper). In: Proceedings of the 4th international conference on trust and trustworthy computing (TRUST 2011). Springer

    Google Scholar 

  • Shafer G (1976) A mathematical theory of evidence. Princeton University Press, Princeton

    MATH  Google Scholar 

  • Sutton RS, Barto AG (1998) Reinforcement learning: an introduction. MIT Press, Cambridge, MA

    Google Scholar 

  • Wang Y, Singh MP (2010) Evidence-based trust: a mathematical model geared for multiagent systems. ACM Trans Auton Adapt Syst (TAAS) 5(4):14

    Google Scholar 

  • Wang Y, Vassileva J (2007) Toward trust and reputation based web service selection: a survey. Int Trans Syst Sci Appl 3(2):118–132

    Google Scholar 

  • Yan Z, Prehofer C (2011) Autonomic trust management for a component-based software system. IEEE Trans Dependable Secure Comput 8(6):810–823

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rachid El Bansarkhani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Bansarkhani, R.E., Hauke, S., Buchmann, J. (2014). Towards Security Solutions for Emergent Business Software. In: Brunetti, G., Feld, T., Heuser, L., Schnitter, J., Webel, C. (eds) Future Business Software. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-319-04144-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04144-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04143-8

  • Online ISBN: 978-3-319-04144-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics