TY - CHAP
T1 - Non-standards for Trust: Foreground trust and second thoughts for mobile security
AU - Marsh, Stephen
AU - Noël, Sylvie
AU - Storer, Tim
AU - Wang, Yao
AU - Briggs, Pamela
AU - Robart, Lewis
AU - Stewart, John
AU - Esfandiari, Babak
AU - El-Khatib, Khalil
AU - Vefa Bicakci, Mehmet
AU - Cuong Dao, Manh
AU - Cohen, Michael
AU - Silva, Daniel
N1 - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011.
PY - 2012
Y1 - 2012
N2 - In this paper, we introduce and discuss Foreground Trust. Foreground Trust, itself based on recent work in the area of Trust Enablement, is a paradigm for allowing devices in a human-device ecosystem the means to reason with and about trust in themselves, other devices, and humans, whilst allowing humans to make trusting decisions using their own internal models (whatever they may be) based on cues from the environment — including the device(s) in use at the time. We discuss the paradigm, and present an actualization of it in the form of Device Comfort, a model of device reasoning based on environmental cues, and the use of the device status to help users make informed trusting and security decisions for themselves. In particular we focus on the interface between user and device to help the user make trust-based decisions and use second thoughts as a means to educate and raise user awareness about their security in online and mobile behaviours.
AB - In this paper, we introduce and discuss Foreground Trust. Foreground Trust, itself based on recent work in the area of Trust Enablement, is a paradigm for allowing devices in a human-device ecosystem the means to reason with and about trust in themselves, other devices, and humans, whilst allowing humans to make trusting decisions using their own internal models (whatever they may be) based on cues from the environment — including the device(s) in use at the time. We discuss the paradigm, and present an actualization of it in the form of Device Comfort, a model of device reasoning based on environmental cues, and the use of the device status to help users make informed trusting and security decisions for themselves. In particular we focus on the interface between user and device to help the user make trust-based decisions and use second thoughts as a means to educate and raise user awareness about their security in online and mobile behaviours.
U2 - 10.1007/978-3-642-29963-6_4
DO - 10.1007/978-3-642-29963-6_4
M3 - Chapter
SN - 978-3642299629
VL - 7170
T3 - Lecture Notes in Computer Science
SP - 28
EP - 39
BT - Security and Trust Management
PB - Springer
CY - London
ER -