Skip to main content

A Causality-Based Model for Describing the Trustworthiness of a Computing Device

  • Conference paper
  • First Online:
Trusted Systems (INTRUST 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9565))

Included in the following conference series:

  • 385 Accesses

Abstract

The ability to describe the trustworthiness of a computing device is an important part of the process to establish end-to-end trust. With the understanding that the trustworthiness of a computing device relies on its capabilities, we report on and contribute a novel causality-based model. This causality-based model represents information about the dependencies between trust notions, capabilities, computing mechanisms and their configurations. In this work, the concept of causality within the model is defined first. This involves detailing the semantic meaning of the terms used in the model. A pictorial representation is then developed to show the causal dependencies as a graph. This step specifies the vertices and edges used in the causal graph. To implement the causality-based model, the causal graph was translated into an eXtensible Markup Language schema and added to the Metadata Access Point database server of the Trusted Network Connect open architecture. Finally, the trust assessment of the causal graph is explained.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. National Cyber Leap Year Summit 2009 Report. https://www.nitrd.gov/

  2. Grawrock, D., Vishik, C., Rajan, A., Ramming, C., Walker, J.: Defining trust evidence: research directions. In: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, p. 66, ACM (2011)

    Google Scholar 

  3. Stoneburner, G.: Underlying Technical Models for Information Technology Security. Recommendations of the National Institute of Standards and Technology, December 2001

    Google Scholar 

  4. Pearl, J.: Causality. Cambridge University Press, New York (2009)

    Book  MATH  Google Scholar 

  5. Lewis, D.: Causation. J. Philos. 70(17), 556–567 (1973)

    Article  Google Scholar 

  6. Halpern, J.Y., Pearl, J.: Causes and explanations: a structural-model approach. part I: causes. Br. J. Philos. Sci. 56(4), 843–887 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  7. Trusted Computing Group. TNC Architecture for Interoperability. Specification Version 1.5. Revision 4, 7 May 2012

    Google Scholar 

  8. Trusted Computing Group. TNC IF-MAP Metadata for Network Security. Specification Version 1.1. Revision 9, 7 May 2012

    Google Scholar 

  9. Trusted Computing Group. IF-MAP Metadata for ICS Security. Specification Version 1.0. Revision 46, 15 September 2014

    Google Scholar 

  10. Will, A., Challener, D.: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress, New York (2015)

    Google Scholar 

  11. National Institute of Standards and Technology. National Vulnerability Database. Common Platform Enumeration. https://nvd.nist.gov/cpe.cfm

  12. National Institute of Standards and Technology. National Vulnerability Database. Common Configuration Enumeration. https://nvd.nist.gov/cce/

  13. University of Applied Sciences and Arts, Hochschule Hannover. Faculty IV, Department of Computer Science. http://trust.f4.hs-hannover.de/

  14. Kim, A., Luo, J., Kang, M.: Security ontology for annotating resources. In: Meersman, R. (ed.) OTM 2005. LNCS, vol. 3761, pp. 1483–1499. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. Yap, J.Y., Tomlinson, A.: A socio-technical study on user centered trust notions and their correlation to stake in practical information technology scenarios. In: Proceedings of the 6th ASE International Conference on Privacy, Security and Trust, 14–16 December 2014

    Google Scholar 

  16. Rivest, R.L.: Learning decision lists. Mach. Learn. 2(3), 229–246 (1987)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiun Yi Yap .

Editor information

Editors and Affiliations

A Appendix

A Appendix

Fig. 6.
figure 6

XML schema of causal graph data model.

Fig. 7.
figure 7

XML representation of the sample causal graph.

Fig. 8.
figure 8

Example of a trust policy.

Fig. 9.
figure 9

XQuery command to check for a specific mechanisms that “DiskLocker” calls on.

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Yap, J.Y., Tomlinson, A. (2016). A Causality-Based Model for Describing the Trustworthiness of a Computing Device. In: Yung, M., Zhang, J., Yang, Z. (eds) Trusted Systems. INTRUST 2015. Lecture Notes in Computer Science(), vol 9565. Springer, Cham. https://doi.org/10.1007/978-3-319-31550-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31550-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31549-2

  • Online ISBN: 978-3-319-31550-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics