Affiliation:
1. Department of Computer Science and Technology, Tongji University, Shanghai, China
Abstract
The cross-trust domain environment in which heterogeneous identity alliances are located often does not have a completely trusted centralized trust root, and different trust domains and entities also have specific security requirements. In view of the above problems, we believe that trust measurement of cross-domain identities based on risk assessment is an effective method to achieve decentralized proof of user identities in heterogeneous cyberspace. There are various risk assessment models. We choose the more mature attack graph theory in the existing research to apply to the new field of cross-trust domain management of heterogeneous identities. We propose an attribute attack graph evaluation model to evaluate cross-domain identities through risk measurement of attributes. In addition, heterogeneous identity alliances also have architectural risks, especially the risk of decentralized underlying structures. In response to this problem, we identify the risk of the identity alliance infrastructure, and combine the risk assessment and presentation system design to verify the principle.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference30 articles.
1. Duan Y. , Cai Y. , Wang Z. , et al., A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty, Applied Sciences 3(8) (2018).
2. Security risk assessment based on bayesian multi-step attack graphs;Yang;Journal of Computational Information Systems,2015
3. Distributed attack graph generation;Kaynar;IEEE Transactions on Dependable and Secure Computing,2015
4. Cook K. , Shaw T. , Hawrylak P. , et al., Scalable attack graph generation, in Proceedings of the 11th Annual Cyber and Information Security Research Conference, ACM, Oak Ridge, TN, USA, (2016), 21.
5. Exploring mobile banking services for user behavior in intention adoption: using new hybrid MADM model, Service Business 9(3) (2015), 541–565.