Abstract
Providing protection to the financial infrastructure in the face of faults and malevolent attacks is vital to the stability, availability, and continuity of key financial markets and businesses worldwide. Traditional protection approaches have focused on protecting individual financial institutions (FIs) while ignoring the threats arising from cross-domain interactions as well as those originating from other critical infrastructures. With the growing complexity of inter-organisational boundaries and their increasing interdependence, such isolated approaches are no longer adequate. However, sharing information between FIs relating to critical events and the reliance on others’ quality of service attributes such as security requires varying levels of trust between them depending on the requirements of each individual FI and the sensitivity of exchanged information. This paper describes a trust management system developed to allow the evaluation, monitoring, and management of trustworthiness levels of FIs exchanging critical events and information. Trustworthiness levels are used to assure FIs of the reliability of each other and to filter events and data being processed. The system introduces a novel reusable architecture that allows flexibility and extensibility of trust metrics and trust algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
CoMiFin (Communication Middleware for Monitoring Financial Critical Infrastructures), http://www.comifin.eu
Lodi, G., Querzoni, L., Baldoni, R., Marchetti, M., Colajanni, M., Bortnikov, V., Chockler, G., Dekel, E., Laventman, G., Roytman, A.: Defending Financial Infrastructures Through Early Warning Systems: The Intelligence Cloud Approach. In: Proc. 5th Annual Workshop on Cyber Security and Information Intelligence Research, Knoxville, TN, USA (2009)
McGibney, J., Botvich, D.: A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam. In: Proc. 2nd Int. Conf. on Availability, Reliability, and Security (ARES), Vienna, pp. 749–756 (2007)
Drools, http://www.jboss.org/drools
Huynh, T., Jennings, N., Shadbolt, N.: An integrated trust and reputation model for open multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems 13(2), 119–154 (2006)
**ong, L., Liu, L.: PeerTrust: Supporting Reputation-based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering (TKDE) 16(7), 843–857 (2004)
Singh, M.P.: Trustworthy service composition: Challenges and research questions. In: Proc. of the Autonomous Agents and Multi-Agent Systems, Workshop on Deception, Fraud and Trust in Agent Societies, pp. 117–135 (2002)
Malik, Z., Bouguettaya, A.: RATEWeb: Reputation Assessment for Trust Establishment among Web services. The Int. Journal on Very Large Data Bases 18(4), 885–911 (2009)
Reiley, D., Bryan, D., Prasad, N., Reeves, D.: Pennies from Ebay: The Determinants of Price in Online Auctions. Journal of Industrial Economics 55(2), 223–233 (2007)
Blaze, M., Feigenbaum, J., Keromytis, A.: KeyNote: Trust Management for Public-Key Infrastructures. In: Security Protocols Int. Workshop, Cambridge, England, pp. 56–63 (1998)
Sabater, J.: Trust and reputation for agent societies. Departament d’Informática, Universitat Autónoma de Barcelona (UAB), Ph.D. Thesis (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Elshaafi, H., McGibney, J., Mulcahy, B., Botvich, D. (2011). Enhancement of Critical Financial Infrastructure Protection Using Trust Management. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-22365-5_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22364-8
Online ISBN: 978-3-642-22365-5
eBook Packages: Computer ScienceComputer Science (R0)