Towards Trusted Data Processing for Information and Intelligence Systems
dc.contributor.author | Wang, Yong | |
dc.contributor.author | Muthusamy Ragothaman, Kaushik Nagarajan | |
dc.contributor.author | Shakya, Bijay | |
dc.date.accessioned | 2020-12-24T20:17:59Z | |
dc.date.available | 2020-12-24T20:17:59Z | |
dc.date.issued | 2021-01-05 | |
dc.description.abstract | Data is a valued asset and its security is essential for any enterprise and organization. This paper introduces Trusted Data Processing (TDP) and addresses three fundamental questions in TDP: 1) what are the essential requirements to achieve TDP? 2) what security mechanisms and safeguards are available to ensure TDP? 3) how to integrate TDP to practice? Based on the attacks targeting at data assets and their consequences, the requirements to achieve TDP, including data security, data privacy, accountability, transparency, distributed computing, and trusted elements, are identified. Available security mechanisms and safeguards to ensure TDP are discussed. This paper also summarizes the challenges to achieve TDP and provides a practical guidance to achieve TDP through the integration with NIST Cybersecurity Framework. | |
dc.format.extent | 10 pages | |
dc.identifier.doi | 10.24251/HICSS.2021.753 | |
dc.identifier.isbn | 978-0-9981331-4-0 | |
dc.identifier.uri | http://hdl.handle.net/10125/71373 | |
dc.language.iso | English | |
dc.relation.ispartof | Proceedings of the 54th Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security | |
dc.subject | challenges | |
dc.subject | privacy | |
dc.subject | security | |
dc.subject | trusted data processing | |
dc.title | Towards Trusted Data Processing for Information and Intelligence Systems | |
prism.startingpage | 6242 |
Files
Original bundle
1 - 1 of 1