skip to main content
10.1145/2746194.2746197acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
research-article
Open Access

Towards a science of trust

Published:21 April 2015Publication History

ABSTRACT

The diverse views of science of security have opened up several alleys towards applying the methods of science to security. We pursue a different kind of connection between science and security. This paper explores the idea that security is not just a suitable subject for science,. but that the process of security is also similar to the process of science. This similarity arises from the fact that both science and security depend on the methods of inductive inference. Because of this dependency, a scientific theory can never be definitely proved, but can only be disproved by new evidence, and improved into a better theory. Because of the same dependency, every security claim and method has a lifetime, and always eventually needs to be improved.

In this general framework of security-as-science, we explore the ways to apply the methods of scientific induction in the process of trust. The process of trust building and updating is viewed as hypothesis testing. We propose to formulate the trust hypotheses by the methods of algorithmic learning, and to build more robust trust testing and vetting methodologies on the solid foundations of statistical inference.

References

  1. Thomas Bayes. An essay towards solving a problem in the doctrine of chances. Philosophical Transactions of the Royal Soceity. of London, 53: 370--418, 1763.Google ScholarGoogle Scholar
  2. Steven M. Bellovin. On the brittleness of software and the infeasibility of security metrics. IEEE Security & Privacy, 4(4): 96--96, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Terry Benzel. The science of cyber security experimentation: The DETER Project. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11, pages 137--148, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Joyce Berg, John Dickhaut, and Kevin McCabe. Trust, reciprocity, and social history. Games and Economic Behavior, 10(1): 122--142, July 1995.Google ScholarGoogle ScholarCross RefCross Ref
  5. J. M. Bernardo and A. F. M. Smith. Bayesian Theory. Wiley Series in Probability and Statistics. Wiley, 2009.Google ScholarGoogle Scholar
  6. V. Buskens. Social Networks and Trust. Theory and Decision Library C. Springer US, 2002.Google ScholarGoogle Scholar
  7. Phuong Cao, Key-whan Chung, Zbigniew Kalbarczyk, Ravishankar Iyer, and Adam J. Slagell. Preemptive intrusion detection. In Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS '14, pages 21:1--21:2, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. M. Cover and J. A. Thomas. Elements of Information Theory. Wiley, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. R. Cox and D. V. Hinkley. Theoretical Statistics. Chapman and Hall, 1990.Google ScholarGoogle Scholar
  10. Dorothy E. Denning. An intrusion-detection model. IEEE Trans. Softw. Eng., 13(2): 222--232, February 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Feyerabend. Against Method. Verso, 1993.Google ScholarGoogle Scholar
  12. Richard P. Feynman. The Character of Physical Law. Penguin Books, 1992.Google ScholarGoogle Scholar
  13. Ronald A. Fisher. Statistical Methods for Research Workers. Oliver and Boyd, Edinburgh, 1925.Google ScholarGoogle Scholar
  14. Ronald A. Fisher. Statistical Methods and Scientific Inference. Oliver and Boyd, Edinburgh, UK, second edition, 1959.Google ScholarGoogle Scholar
  15. Jingwei Huang and David Nicol. A formal-semantics-based calculus of trust. IEEE Internet Computing, 14(5): 38--46, September 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jingwei Huang and David M. Nicol. Evidence-based trust reasoning. In Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS '14, pages 17:1--17:2, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. JASON Defense Advisory Panel. Science of Cyber-security. The MITRE Corporation, 2010.Google ScholarGoogle Scholar
  18. Audun Jøsang, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision. Decis. Support Syst., 43: 618--644, March 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Andrei Kolmogorov. On the logical foundations of probability theory. In A. N. Shiryayev, editor, Selected Works of A. N. Kolmogorov, volume 26 of Mathematics and Its Applications (Soviet Series), pages 515--519. Springer Netherlands, 1992.Google ScholarGoogle Scholar
  20. Thomas S. Kuhn. The Structure of Scientific Revolutions. University of Chicago Press, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  21. Imre Lakatos. The Problem of Inductive Logic. Proceedings of the International Colloquium in Philosophy of Science (London, 1965). North Holland Publishing Company, 1968.Google ScholarGoogle Scholar
  22. Carl E. Landwehr. Cybersecurity: From engineering to science. The Next Wave, 19(2): 2--5, 2012.Google ScholarGoogle Scholar
  23. N. Luhmann. Trust; And, Power: Two Works. Number pts. 1--2 in UMI Books on Demand. Wiley, 1979.Google ScholarGoogle Scholar
  24. Teresa F Lunt. A survey of intrusion detection techniques. Computers & Security, 12(4): 405--418, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Andrew Meneely, Ben Smith, and Laurie Williams. Validating software metrics: A Spectrum of Philosophies. ACM Trans. Softw. Eng. Methodol., 21(4): 24:1--24:28, February 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Robert Meushaw. NSA initiatives in cybersecurity science. The Next Wave, 19(4): 8--13, 2012.Google ScholarGoogle Scholar
  27. Jerzy Neyman and Egon S. Pearson. On the use and interpretation of certain test criteria for purposes of statistical inference: Part I, Part II. Biometrika, 20A(1/2, 3/4): 175--240, 263--294, 1928.Google ScholarGoogle Scholar
  28. Jerzy Neyman and Egon S. Pearson. On the problem of the most efficient tests of statistical hypotheses. Philosophical Transactions of the Royal Society of London, Series A, 231: 289--337, 1933.Google ScholarGoogle ScholarCross RefCross Ref
  29. D. M. Nicol, W. H. Sanders, W. L. Scherlis, and L. A. Williams. Science of security hard problems: A Lablet Perspective. cps-vo.org/file/6394/download/47034, retrieved on 2015/1/10.Google ScholarGoogle Scholar
  30. D. M. Nicol and M. P. Singh, editors. HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, New York, NY, USA, 2014. ACM.Google ScholarGoogle Scholar
  31. Dusko Pavlovic. Dynamics, robustness and fragility of trust. In Pierpaolo Degano, Joshua Guttman, and Fabio Martinelli, editors, Proceedings of FAST 2008, volume 5491 of Lecture Notes in Computer Science, pages 97--113. Springer Verlag, 2008. arxiv.org:0808.0732. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Dusko Pavlovic. The unreasonable ineffectiveness of security engineering: An overview. In José Luiz Fiadeiro and Stefania Gnesi, editors, Proceedings of IEEE Conference on Software Engineering and Formal Methods, Pisa, Italy, 2010, pages 12--18. IEEE, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Dusko Pavlovic. Quantifying and qualifying trust: Spectral decomposition of trust networks. In Pierpaolo Degano, Sandro Etalle, and Joshua Guttman, editors, Proceedings of FAST 2010, volume 6561 of Lecture Notes in Computer Science, pages 1--17. Springer Verlag, 2011. arxiv.org:1011.5696. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Dusko Pavlovic. On bugs and elephants: Mining for science of security. The Next Wave, 19(2): 23--29, 2012.Google ScholarGoogle Scholar
  35. Kenneth Pennington. Innocent until proven guilty: The origins of a legal maxim. Jurist, 63: 106--124, 2003.Google ScholarGoogle Scholar
  36. Karl Popper. The Logic of Scientific Discovery. Routledge Classics. Taylor & Francis, 2002.Google ScholarGoogle Scholar
  37. Jorma Rissanen. Information and Complexity in Statistical Modeling. Information science and statistics. Springer, New York, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Fred B. Schneider. Blueprint for a science of cybersecurity. The Next Wave, 19(2): 47--57, 2012.Google ScholarGoogle Scholar
  39. Ray J. Solomonoff. A formal theory of inductive inference. Part I., Part II. Information and Control, 7: 1--22, 224--254, 1964.Google ScholarGoogle ScholarCross RefCross Ref
  40. C. S. Wallace. Statistical and Inductive Inference by Minimum Message Length. Information Science and Statistics. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Jacob Ziv and Abraham Lempel. A universal algorithm for sequential data compression. IEEE Transactions on Information Theory, 23(3): 337--343, 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Jacob Ziv and Abraham Lempel. Compression of individual sequences via variable-rate coding. IEEE Transactions on Information Theory, 24(5): 530--536, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards a science of trust

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              HotSoS '15: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security
              April 2015
              170 pages
              ISBN:9781450333764
              DOI:10.1145/2746194
              • General Chair:
              • David Nicol

              Copyright © 2015 Owner/Author

              Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 21 April 2015

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              HotSoS '15 Paper Acceptance Rate13of22submissions,59%Overall Acceptance Rate34of60submissions,57%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader