Next Article in Journal
Design, Characterization and Analysis of a 0.35 μm CMOS SPAD
Next Article in Special Issue
Generic Learning-Based Ensemble Framework for Small Sample Size Face Recognition in Multi-Camera Networks
Previous Article in Journal
Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things
Previous Article in Special Issue
Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks
Article Menu

Export Article

Open AccessArticle
Sensors 2014, 14(12), 22754-22772;

A Layered Trust Information Security Architecture

Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Information Technology and Computer Science, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor José García Santesmases, 9, Ciudad Universitaria, 28040 Madrid, Spain
Electrical Engineering Department, University of Brasilia, Campus Universitário Darcy Ribeiro, Asa Norte, 70910-900 Brasilia, DF, Brazil
School of Engineering and ICT, University of Tasmania, Private Bag 87, Hobart, TAS 7001, Australia
Author to whom correspondence should be addressed.
Received: 5 October 2014 / Revised: 14 November 2014 / Accepted: 25 November 2014 / Published: 1 December 2014
(This article belongs to the Special Issue Sensor Computing for Mobile Security and Big Data Analytics)
Full-Text   |   PDF [660 KB, uploaded 1 December 2014]


Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. View Full-Text
Keywords: information security; information treatment; risk management; security architecture; trust information security; information treatment; risk management; security architecture; trust
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

de Oliveira Albuquerque, R.; Villalba, L.J.G.; Orozco, A.L.S.; Buiati, F.; Kim, T.-H. A Layered Trust Information Security Architecture. Sensors 2014, 14, 22754-22772.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top