Towards A Framework for Cyber Social Status Based Trusted Open Collaboration Oct. 9, 2010 Jaehong Park, Yuan Cheng, Ravi Sandhu Institute for Cyber Security.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

1 TITLE OF THE ARTICLE Author (Institution) Co-Author (Institution) .
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Chapter 5 Transfer of Training
There is a pattern for factoring trinomials of this form, when c
Kapitel 21 Astronomie Autor: Bennett et al. Galaxienentwicklung Kapitel 21 Galaxienentwicklung © Pearson Studium 2010 Folie: 1.
Slide 1 Insert your own content. Slide 2 Insert your own content.
1 TIUPAM: A Framework for Trustworthiness-centric Information Sharing Shouhuai Xu Univ. Texas at San Antonio Joint work with Qun Ni and Elisa Bertino (Purdue.
© 2004 Ravi Sandhu The Schematic Protection Model (SPM) Ravi Sandhu Laboratory for Information Security Technology George Mason University.
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
11 World-Leading Research with Real-World Impact! A Framework for Risk-Aware Role Based Access Control Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu.
Institute for Cyber Security
Chapter 13: The Systems Perspective of a DSS
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 4 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Chapter 40 - Physiology and Pathophysiology of Diuretic Action Copyright © 2013 Elsevier Inc. All rights reserved.
CAMBRIDGE LIBRARIES & GALLERIES QUEEN SQUARE LIBRARY.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
REQ Drop from Demand Response Programs Process Flow Retail Customer Demand Response Service Provider (DRSP) Distribution Company 1 Drop Request.
Chapters 1 & 2 Theorem & Postulate Review Answers
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
1 Developing More-effective Leaders Using Multi-rater Feedback Systems Assessments USA & Canada
The Implementation Structure DG AGRI, October 2005
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
List and Search Grants Chapter 2. List and Search Grants 2-2 Objectives Understand the option My Grants List Grant Screen Viewing a Grant Understand the.
0 - 0.
ALGEBRAIC EXPRESSIONS
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
ZMQS ZMQS
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Quantification of Integrity Michael Clarkson and Fred B. Schneider Cornell University MIT Systems Security and Cryptography Discussion Group October 15,
1 Cyber Insurance and IT Security Investment: Impact of Interdependent Risk Hulisi Ogut, UT-Dallas Srinivasan Raghunathan, UT-Dallas Nirup Menon, UT-Dallas.
Advertising, Sales Promotion, and Public Relations Chapter 19 McGraw-Hill/Irwin Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights.
E-Participa project Virtual environments for local citizen participation: principal bases for design Interdisciplinary analysis of municipal citizen participation.
Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian.
O X Click on Number next to person for a question.
© S Haughton more than 3?
1 Directed Depth First Search Adjacency Lists A: F G B: A H C: A D D: C F E: C D G F: E: G: : H: B: I: H: F A B C G D E H I.
Twenty Questions Subject: Twenty Questions
Linking Verb? Action Verb or. Question 1 Define the term: action verb.
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
CH 7. Organizational buying refers to the decision-making process by which formal organizations establish the need for purchased products and services,
Properties of Exponents
Chapter 5 Test Review Sections 5-1 through 5-4.
1 First EMRAS II Technical Meeting IAEA Headquarters, Vienna, 19–23 January 2009.
Addition 1’s to 20.
25 seconds left…...
Only 2% felt the responsibility for education belonged wholly to the school, 58% of parents interviewed felt they were equally responsible. Williams et.
Test B, 100 Subtraction Facts
11 = This is the fact family. You say: 8+3=11 and 3+8=11
Week 1.
Data Warehouse Tutorial Created Revised Office of Information, Technology and Accountability.
We will resume in: 25 Minutes.
Solving Addition and Subtraction Inequalities
1 Ke – Kitchen Elements Newport Ave. – Lot 13 Bethesda, MD.
1 Unit 1 Kinematics Chapter 1 Day
FIND THE AREA ( ROUND TO THE NEAREST TENTHS) 2.7 in 15 in in.
O X Click on Number next to person for a question.
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
How Cells Obtain Energy from Food
1 Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair April 12, © Ravi Sandhu World-Leading.
11 World-Leading Research with Real-World Impact! Integrated Provenance Data for Access Control in Group-centric Collaboration Dang Nguyen, Jaehong Park.
11 World-Leading Research with Real-World Impact! Towards Provenance and Risk-Awareness in Social Computing Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram.
On Data Provenance in Group-centric Secure Collaboration Oct. 17, 2011 CollaborateCom Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
Presentation transcript:

Towards A Framework for Cyber Social Status Based Trusted Open Collaboration Oct. 9, 2010 Jaehong Park, Yuan Cheng, Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio 1

Open Collaboration? 2

Collaboration Closed Collaboration – Information and resource sharing amongst selected participants Open Collaboration – Anyone can participate – Proven to be productive – Inherently a social activity, hence trust establishment needs a social computing 3

Trusted Collaboration Trusted Closed Collaboration – Trustworthiness of selected users and shared resource is verified Trusted Open Collaboration (TOC) – NOT MEAN an open collaboration system with a guaranteed trustworthiness – MEANS a discriminative measure (for example, cyber social status in our case) can be facilitated in open collaboration to provide certain degree of trust to participants. 4

Open (source) Collaboration Principles Egalitarian – Everyone can contribute, because open source projects are accessible on the Internet and the project community is typically inclusive to anyone who wants to help. Meritocratic – Contributions are judged transparently and based on their merits. All decisions are discussed publicly on mailing lists and can be looked up for reference. Self-organizing – There is typically no defined process imposed from the outside so the project community itself determines how to go about its work. By Dirk Riehle et al. Bringing Open Source Best Practices into Corporations. IEEE Software,

TOC: Three Principles Egalitarian – user with equal footing – anyone can participate (contribute and get benefit) – No user account or anyone can create an account – Not necessarily means all contributions are valued equally Meritocratic – contribution-based weighted value of user and resource – True only to a certain degree since Contribution-based discriminative social standing can allow a user to influence other users social standing Social standing can be given by authority or other social activities, not by contribution (or merit) Discriminative – Trust is based on selective discrimination of participants and resources – Discrimination is based on various cyber social statuses 6

TOC: Two Criteria Contribution evaluation process – Self-organized Collaboration community decides the process (No pre-imposed process from outside) – System-organized Evaluation process can be pre-imposed by system E.g., In wiki, the system may allow an expert to delete others shared resource Cyber Social Status (CSS) management – Self-governed Collaboration community itself (participants activities) generates and manages CSS User participation in governing social status and social activity – Authority-governed CSS is given by an authority who is not a participant 7

Collaboration Taxonomy 8

Authority-given User-claimed User CSS-based User Cyber Social Status (u-CSS) 9

User Cyber Social Status (u-CSS) – cont. 10 Resource CSS-based User-participation-based Collaborated Social Activity (CSA)-based

Authority-given User-claimed User CSS-based Resource Cyber Social Status (r-CSS) 11

Resource Cyber Social Status (r-CSS) – cont. 12 Resource CSS-based Collaborated Social Activity (CSA)-based

Characteristics of u-CSS Types CSS TypeCSS GoverningMeritocracyCSS Vulnerability Authority-givenauthorityNot meritocraticNo Sybil Attack User-claimedSelf or other user Not meritocraticIf self, no Sybil Attc. If other, depends on difficulty of user claiming User CSS-based*Depends on added CSS type No, alone. Meritocratic w/ CSA-based u-CSS No Sybil Attack alone Resource CSS- based usersMeritocratic w/ CSA- based r-CSS Vulnerable if r-CSS can be generated by CSA User participation- based selflimited meritocratic (no others eval.) No Sybil Attack CSA-basedusersMeritocraticVulnerable to Sybil Attack 13 *Needs other u-CSS type(s)

Characteristics of r-CSS Types 14 CSS TypeCSS GoverningMeritocracy Authority-givenauthorityNot meritocratic User-claimedUserNot meritocratic User CSS-basedUserNot meritocratic Resource CSS-based*Depends on additional r-CSS type Meritocratic w/ CSA-based r-CSS CSA-basedUsersMeritocratic *Needs other r-CSS type(s)

Amazon-like TOC 15 CSS Types used: CSA-based uCSS/rCSS uCSS-based rCSS rCSS-based uCSS Authority given uCSS

eBay-like TOC 16 CSS Types used: CSA-based uCSS uCSS-based rCSS

YouTube-like TOC 17 CSS Types used: CSA-based uCSS/rCSS uCSS-based rCSS User-claimed rCSS Authority given rCSS

Questions? Comments? 18