Hostname: page-component-78c5997874-g7gxr Total loading time: 0 Render date: 2024-11-15T07:51:31.614Z Has data issue: false hasContentIssue false

A theoretical inter-organizational trust-based security model

Published online by Cambridge University Press:  18 August 2006

HENRY HEXMOOR
Affiliation:
Department of Computer Science, Southern Illinois University, Faner Hall, Carbondale, IL 62901, USA; e-mail: hexmoor@cs.siu.edu
SETH WILSON
Affiliation:
Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, AR 72701, USA; e-mail: slw08@uark.edu, sbhatta@uark.edu
SANDEEP BHATTARAM
Affiliation:
Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, AR 72701, USA; e-mail: slw08@uark.edu, sbhatta@uark.edu

Abstract

This work examines the interplay of inter-personal and inter-organizational trust, two distinct but related concepts, through a theoretic inter-organizational trust-based security model for a multi-agent system information-sharing community. A calculus that mathematically models trust building at the inter-organizational level is at the heart of this model. In inter-organizational or inter-firm exchange, the role of the boundary spanner, an organizational representative, is important in reducing asymmetries that may exist between the two parties. Trust is a crucial component to the dyadic interaction at the inter-personal or boundary spanner level, and the trust established at this level also affects the overall quality of the relationship at the inter-organizational level. Trust, as an aspect of social control, is thus viewed as a more effective mechanism for security in an open, distributed system, like an information-sharing community. The inter-organizational trust-based security model proposed herein represents a soft security approach. It affords several important benefits over traditional hard security mechanisms used in open systems — robustness, scalability, and adaptability. The inter-organizational trust-based model is an important contribution to the computational security community, as other open systems applications of a distributed or pervasive nature could adapt it and realize its benefits. It is also one of a few attempts to model trust building at either the inter-organizational or inter-personal level.

Type
Research Article
Copyright
2006 Cambridge University Press

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)