Next Article in Journal
Design, Characterization and Analysis of a 0.35 μm CMOS SPAD
Next Article in Special Issue
Generic Learning-Based Ensemble Framework for Small Sample Size Face Recognition in Multi-Camera Networks
Previous Article in Journal
Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things
Previous Article in Special Issue
Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks

A Layered Trust Information Security Architecture

Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Information Technology and Computer Science, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor José García Santesmases, 9, Ciudad Universitaria, 28040 Madrid, Spain
Electrical Engineering Department, University of Brasilia, Campus Universitário Darcy Ribeiro, Asa Norte, 70910-900 Brasilia, DF, Brazil
School of Engineering and ICT, University of Tasmania, Private Bag 87, Hobart, TAS 7001, Australia
Author to whom correspondence should be addressed.
Sensors 2014, 14(12), 22754-22772;
Received: 5 October 2014 / Revised: 14 November 2014 / Accepted: 25 November 2014 / Published: 1 December 2014
(This article belongs to the Special Issue Sensor Computing for Mobile Security and Big Data Analytics)
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. View Full-Text
Keywords: information security; information treatment; risk management; security architecture; trust information security; information treatment; risk management; security architecture; trust
Show Figures

MDPI and ACS Style

De Oliveira Albuquerque, R.; Villalba, L.J.G.; Orozco, A.L.S.; Buiati, F.; Kim, T.-H. A Layered Trust Information Security Architecture. Sensors 2014, 14, 22754-22772.

AMA Style

De Oliveira Albuquerque R, Villalba LJG, Orozco ALS, Buiati F, Kim T-H. A Layered Trust Information Security Architecture. Sensors. 2014; 14(12):22754-22772.

Chicago/Turabian Style

De Oliveira Albuquerque, Robson, Luis J.G. Villalba, Ana L.S. Orozco, Fábio Buiati, and Tai-Hoon Kim. 2014. "A Layered Trust Information Security Architecture" Sensors 14, no. 12: 22754-22772.

Find Other Styles

Article Access Map by Country/Region

Only visits after 24 November 2015 are recorded.
Back to TopTop