{"id":39185,"date":"2021-04-05T10:37:06","date_gmt":"2021-04-05T14:37:06","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=39185"},"modified":"2023-07-10T04:59:20","modified_gmt":"2023-07-10T08:59:20","slug":"trust-management-zero-trust","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/trust-management-zero-trust\/39185\/","title":{"rendered":"Businesses need trust, and trust management is here to help."},"content":{"rendered":"<p>Trust is crucial to personal and professional decisions. It determines <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/data-new-toxic-waste\/34184\/\" target=\"_blank\" rel=\"noopener nofollow\">which brands we\u2019ll share our data with<\/a> or work with and allows <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/flexible-work-remote-control\/36898\/\" target=\"_blank\" rel=\"noopener nofollow\">managers to let employees work flexibly<\/a>. But could trust help us make better decisions about sharing corporate information and IT network access?<\/p>\n<p>Workplace mental health expert Dr. Joti Samra says <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/homeworking-mental-health\/34941\/\" target=\"_blank\" rel=\"noopener nofollow\">pandemic life has given us \u201cnew co-workers:\u201d Those we live with<\/a> 24 hours a day, seven days a week. My partner <a href=\"https:\/\/www.linkedin.com\/in\/theo-dimitrakos-2017\/\" target=\"_blank\" rel=\"noopener nofollow\">Dr. Theo Dimitrakos<\/a> is a world-leading expert in trust management, currently working in the Trustworthiness Theory, Technology and Engineering Lab, Huawei Europe. He\u2019s a <a href=\"https:\/\/www.researchgate.net\/profile\/Theo_Dimitrakos\" target=\"_blank\" rel=\"noopener nofollow\">much-cited author<\/a>, Professor of Computer Science at the <a href=\"https:\/\/www.kent.ac.uk\/computing\/people\/3171\/dimitrakos-theodosios\" target=\"_blank\" rel=\"noopener nofollow\">University of Kent,<\/a> where he chairs the advisory board of <a href=\"https:\/\/research.kent.ac.uk\/kirccs\/\" target=\"_blank\" rel=\"noopener nofollow\">Kent Interdisciplinary Research Centre in Cyber Security<\/a> and founder of <a href=\"http:\/\/www.ifiptm.org\/\" target=\"_blank\" rel=\"noopener nofollow\">an international trust management research community<\/a>.<\/p>\n<p>Between lockdown chores and deciding who should load the dishwasher \u2013 while we wait for <a href=\"https:\/\/futurism.com\/the-byte\/samsung-bot-handy-dishwasher\" target=\"_blank\" rel=\"noopener nofollow\">Samsung\u2019s futuristic new kitchen robot<\/a> \u2013 we had a cup of tea and chat about trust management.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-39248\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/07111538\/theo_dimitrakos.jpg-3.png\" alt=\"\" width=\"600\" height=\"459\"><\/p>\n<p><em>Dr. Theo Dimitrakos<\/em><\/p>\n<p><strong>Susi O\u2019Neill: Trust management, from what I hear between the walls, seems complex. What are the basics \u2013 how would you explain it to your mother?<\/strong><\/p>\n<p>Theo Dimitrakos: Before retiring, my mother ran an olive oil business in Greece. I learned many skills by helping the family business. In the 1980s, I installed an <a href=\"https:\/\/en.wikipedia.org\/wiki\/Amstrad\" target=\"_blank\" rel=\"noopener nofollow\">Amstrad computer<\/a> in our Athens shop window, showing 8-bit animations to amazed passers. My parents would produce print packaging slips giving measurements of the olive oil\u2019s pureness from the state chemical analysis agency. This was before standard classifications like \u2018virgin\u2019 and \u2018extra virgin\u2019 olive oil.<\/p>\n\t\t\t<div class=\"c-promo-product\">\n\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--medium@sm c-card--aside-hor@lg\">\n\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">Kaspersky Global Transparency Initiative<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \"><span>Action on trust<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t<p>Cybersecurity community and stakeholders verifying trust.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"c-card__aside\">\n\t\t\t\t\t<a href=\"https:\/\/www.kaspersky.com\/transparency-center\" class=\"c-button c-card__link\" target=\"_blank\" rel=\"noopener nofollow\">Find out more<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t<\/div>\n\t\n<p>Central to trust management is reliability assessment, so parties can trust each other to share data. If I claim my olive oil is 100 percent unrefined virgin oil, you need to be able to check my claim. It helps if I give you a trust statement, like the oil purity label. You need to validate the assessor \u2013 in this case, seeing proof from the state agency who is an authority qualified to assess the oil.<\/p>\n<blockquote><p>Through this process, the customer sees a complete trust chain, giving them confidence in your product\u2019s origins. That\u2019s a fundamental principle of trust management.<\/p>\n<cite><p>Dr. Theo Dimitrakos<\/p><\/cite><\/blockquote>\n<p><strong>I can verify your mother\u2019s olive oil is delicious. What are some more key concepts in trust management?<\/strong><\/p>\n<p>In the olive oil example, recognizing authority is a key concept which underpins trust assessment. Different methods of measuring trust are also important. My colleague Professor Audun J\u00f8sang, who invented <a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-319-42337-1\" target=\"_blank\" rel=\"noopener nofollow\">subjective logic<\/a>, created a calculus for computing in trust networks. It\u2019s now combined with <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bayesian_network\" target=\"_blank\" rel=\"noopener nofollow\">decision networks<\/a> to <a href=\"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2020.00054\/full\" target=\"_blank\" rel=\"noopener nofollow\">measure trustworthiness in neural networks<\/a>.<\/p>\n<p>Trust-based decisions inform how an <a href=\"https:\/\/searchenterpriseai.techtarget.com\/definition\/agent-intelligent-agent#:~:text=An%20intelligent%20agent%20is%20a,the%20user%20in%20real%20time.\" target=\"_blank\" rel=\"noopener nofollow\">intelligent agent<\/a> program makes final purchasing decisions using data. Professor Harrison McKnight, my co-editor for <a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-642-29852-3\" target=\"_blank\" rel=\"noopener nofollow\">Trust Management VI<\/a>, developed a <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0963868702000203\" target=\"_blank\" rel=\"noopener nofollow\">cognitive model<\/a> to explain the process.<\/p>\n<p>Another fundamental of trust management is <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/1178618.1178623\" target=\"_blank\" rel=\"noopener nofollow\">trust negotiation<\/a>: Incremental information disclosure. Organizations must take care of what they disclose, to whom and how. Releasing information over time can help reach a trust level to share more valuable data for a common goal.<\/p>\n<blockquote><p>Imagine a group of secret agents negotiates by sharing trivial information between themselves. After sharing lower-level information, they now feel more comfortable disclosing more valuable secrets.<\/p>\n<\/blockquote>\n<p>Trust negotiation can help decide how to share credentials to achieve the least-privilege principle (users can only access the parts of the system or data they need for their job) to implement the <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/zero-trust-security\/21072\/\" target=\"_blank\" rel=\"noopener\">zero-trust security model<\/a>. Trust negotiation algorithms do this and more. Before you let someone have privileged information, you may want to check their security clearance. In an IT system, you may want to share as little information as possible for the task, then let the system ask for more information when you need higher-level access.<\/p>\n<p><strong>How did you become interested in trust management?<\/strong><\/p>\n<p>After gaining my Computer Science Ph.D. at Imperial College, London, I worked at a UK government computing lab. We experienced the first dot-com bubble crash around 2001. People lost trust in tech businesses. I felt I had to take action, so I got involved in an international partnership between government, academics and industry to improve trust between customers and companies.<\/p>\n<p>In 2002, with the late <a href=\"https:\/\/crete.academia.edu\/christosnikolau\" target=\"_blank\" rel=\"noopener nofollow\">Christos Nikolau<\/a> (IBM and University of Crete,) we established iTrust, an interdisciplinary network including <a href=\"https:\/\/en.wikipedia.org\/wiki\/Experimental_economics\" target=\"_blank\" rel=\"noopener nofollow\">experimental economists<\/a>, philosophers, and cybersecurity and access management specialists. Trust management previously meant identity and access management for IT networks. We broaden it to include models for measuring and increasing trust and consumer confidence.<\/p>\n<p>I found the experimental economists\u2019 research particularly interesting. Microeconomics Professor <a href=\"https:\/\/scholar.google.com\/citations?user=3bGMIqsAAAAJ&amp;hl=de\" target=\"_blank\" rel=\"noopener nofollow\">Claudia Keser<\/a> wanted to look at giving incentives for supplying data. We now see that in practice as people trade their data for free online services.<\/p>\n<p>In 2004, I led an international <a href=\"https:\/\/www.ercim.eu\/publication\/Ercim_News\/enw59\/dimitrakos2.html\" target=\"_blank\" rel=\"noopener nofollow\">applied research project<\/a> that developed a framework for managing trust when sharing sensitive data between organizations. The research informed web services trust protocols in use and created a start-up that\u2019s now a <a href=\"https:\/\/www.axiomatics.com\/\" target=\"_blank\" rel=\"noopener nofollow\">market leader in dynamic authorization<\/a>.<\/p>\n<p>My interest in trust management continues. At the forthcoming <a href=\"https:\/\/internationalfunders.org\/2023-ifip-global-conference\/\" target=\"_blank\" rel=\"noopener nofollow\">IFIP conference<\/a>, I will present new methods to authorize and change a person\u2019s access depending on their situation. For example, if they\u2019re working at home and others are present who shouldn\u2019t have access to sensitive documents, or they\u2019re trying to evade detection when taking photos of confidential documents on their computer screen.<\/p>\n<p><strong>How has trust management evolved since then?<\/strong><\/p>\n<p>There have been significant developments and new identity verification models, virtual organizations and consensus-based decisions. There are now more decentralized ways to create digital identities, share and verify them without violating privileges, nor the identity provider needing to track who\u2019s used them.<\/p>\n<p><strong>How does this relate to decentralized data models like blockchain?<\/strong><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/category\/blockchain\/\" target=\"_blank\" rel=\"noopener nofollow\">Blockchain<\/a>\u2018s decentralized trust model has distributed credentials and verifiers. It can be used to implement a trust model, but it\u2019s not the only way to implement trust management today.<\/p>\n<p><a href=\"https:\/\/www.w3.org\/TR\/vc-data-model\/\" target=\"_blank\" rel=\"noopener nofollow\">Credentials verification is a model promoted by W3C<\/a> \u2013 the community that sets global open web standards \u2013 for verifying web information. It has nothing to do with blockchain but can be used alongside it. My colleague <a href=\"https:\/\/verifiablecredentials.info\/team\" target=\"_blank\" rel=\"noopener nofollow\">Professor David Chadwick<\/a>, a co-editor of the standard, <a href=\"https:\/\/www.youtube.com\/watch?v=yqSr0xKcG18\" target=\"_blank\" rel=\"noopener nofollow\">highlights this distinction<\/a>.<\/p>\n<p>Blockchain or not, it means someone can prove your credentials without assuming a centralized authority, the party and identity provider issuer know each other. And you could use someone\u2019s credentials without the identity provider tracking what you do \u2013 for example, when you share your identity documents to open a new bank account or use a trust-led community like Airbnb. If credential verification becomes popular, big tech firms like Google will be less able to track us.<\/p>\n<p><strong>How can businesses establish a suitable trust management model?<\/strong><\/p>\n<p>Knowing your business means understanding its processes and data flows with suppliers, incentives for users and which authorities regulate your data or services. Understand your relationships, model them, design your system, then make it secure. <a href=\"https:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-95276-5_1\" target=\"_blank\" rel=\"noopener nofollow\">Apply security from concept to deployment<\/a>.<\/p>\n<blockquote><p>Never presume trust \u2013 always measure and verify it.<\/p>\n<\/blockquote>\n<p><strong>How can businesses use trust management to improve IT security? <\/strong><\/p>\n<p>Trust management predates <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/zero-trust-security\/21072\/\" target=\"_blank\" rel=\"noopener\">zero trust<\/a> and will probably outlive it. Zero trust integrates different decentralized trust models. It\u2019s becoming popular because of how technology has evolved: Our work environment has become more decentralized with cloud computing, remote working and data sharing.<\/p>\n<p>Zero trust is about decentralized trust models, fusing trust authorization and verification versus reliability. It means you need to check your assertions about someone rather than rely on another authority to validate them. You need to examine the subject and score them, then use that score and the outcome of your trust algorithm to decide what systems and information they can access.<\/p>\n<p>Now we can measure trust, so your decisions must be calculated. You can have verification like <a href=\"https:\/\/www.kaspersky.com\/blog\/36c3-pdf-digital-signature\/18443\/\" target=\"_blank\" rel=\"noopener nofollow\">digital signatures<\/a>, behavior analysis, biometrics, or a combination. This creates a trust score for each entity that should be linked to your access management policies.<\/p>\n<p>Authorization becomes dynamic and continuous. This is often overlooked when considering zero trust strategies for security and access control that only focus on prevention. As trust values change over time, authorization levels and access must change. You may need to increase, reduce or revoke authorization previously given.<\/p>\n<p>With <a href=\"http:\/\/www.ifiptm.org\/wg-11-11-structure\/fabio-martinelli\" target=\"_blank\" rel=\"noopener nofollow\">Dr. Fabio Martinelli<\/a>, Vice-Chair of the European Cybersecurity Organization, we recently developed a <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9343102\" target=\"_blank\" rel=\"noopener nofollow\">lightweight enabling technology<\/a> for network gateways and consumer internet of things (IoT) devices that combine dynamic authorization with an evaluation of trust levels. I hope this helps zero trust models go beyond corporate networks to smart homes and <a href=\"http:\/\/isyou.info\/jisis\/vol10\/no3\/jisis-2020-vol10-no3-04.pdf\" target=\"_blank\" rel=\"noopener nofollow\">data usage control<\/a>.<\/p>\n<p><strong>Excellent! Now I feel suitably informed about trust. So in place of the dishwasher robot, can I use a trust management model to make sure you do this?<\/strong><\/p>\n<p>Yes, but we first need to set up an algorithm and scoring method, agree on incentives and maybe a consensus protocol.<\/p>\n<p><strong>Perhaps technology models can\u2019t solve all our challenges yet.<\/strong><\/p>\n<p><em>Opinions are those of the interviewee and do not represent his employers (corporate or academic).<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How can your business know it can trust its partners? How can your customers know they can trust you? Trust management has the answer.<\/p>\n","protected":false},"author":2521,"featured_media":39188,"template":"","coauthors":[3452],"class_list":{"0":"post-39185","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-data-and-privacy","7":"emagazine-category-opinions","8":"emagazine-category-transparency","9":"emagazine-tag-blockchain","10":"emagazine-tag-trust-management","11":"emagazine-tag-zero-trust"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/trust-management-zero-trust\/39185\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/trust-management-zero-trust\/24501\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/trust-management-zero-trust\/22542\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/39185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/39188"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=39185"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=39185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}