About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Collaborative trust evaluation for wiki security

In 2012 Tenth Annual International Conference on Privacy, Security and Trust (pst) — 2012, pp. 176-184
From

Technical University of Denmark1

Department of Informatics and Mathematical Modeling, Technical University of Denmark2

Computer Science and Engineering, Department of Informatics and Mathematical Modeling, Technical University of Denmark3

Embedded Systems Engineering, Department of Informatics and Mathematical Modeling, Technical University of Denmark4

Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created and maintained by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value of the wiki-system, but at the same time, anyone can also introduce errors into these documents, by accident or on purpose.

A security model for wiki-style authoring systems has previously been proposed. This model is based on both static and dynamic document access controls that enforce a simple integrity based security policy. In this paper, we present a new policy for the existing wiki security model, which provides a higher degree of parameterization and adaptability.

The new policy is analyzed and compared to the original policy. Our evaluation shows that this new policy provides stronger security when the number of malicious and colluding users is low, but it has a clearly defined level of tolerance in terms of the amount of work required by an attacker to achieve a given probability of violating the policy.

Efforts beyond that level, can allow such users to take control of the system, but this is true for all soft security systems. We show that the system parameters can be tuned so that the amount of work required by malicious and colluding users to reach this level is well beyond most attackers' capabilities.

Language: English
Publisher: IEEE
Year: 2012
Pages: 176-184
Proceedings: 10th Annual International Conference on Privacy, Security and Trust (PST 2012)International Conference on Privacy, Security and Trust
ISBN: 1467323233 , 146732325X , 1467323268 , 9781467323239 , 9781467323253 and 9781467323260
Types: Conference paper
DOI: 10.1109/PST.2012.6297938
ORCIDs: Jensen, Christian D.

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis