This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Evolution in Relation to Risk and Trust Management
May 2010 (vol. 43 no. 5)
pp. 49-55
Mass Soldal Lund, SINTEF ICT
Bjørnar Solhaug, SINTEF ICT
Ketil Stølen, SINTEF ICT and University of Oslo
A methodology within risk and trust management in general, and risk and trust assessment in particular, isn't well equipped to address trust issues in evolution.

1. ISO 31000, Risk Management: Principles and Guidelines, Int'l Organization for Standardization, 2009.
2. ISO Guide 73, Risk Management: Vocabulary, Int'l Organization for Standardization, 2009.
3. C.J. Alberts and A.J. Dorofee, OCTAVE Method Implementation Guide Version 2.0, Software Eng. Inst., Carnegie Mellon Univ., June 2001.
4. S.A. Sherer, "Using Risk Analysis to Manage Software Maintenance," J. Software Maintenance, vol. 9, no. 6, 1997, pp. 345-364.
5. M.S. Lund, F. den Braber, and K. St⊘len, "Maintaining Results from Security Assessments," Proc. 7th European Conf. Software Maintenance and Reengineering (CSMR 03), IEEE CS Press, 2003, pp. 341-350.
6. S. Goel and V. Chen, "Can Business Process Reengineering Lead to Security Vulnerabilities: Analyzing the Reengineered Process," Int'l J. Production Economics, vol. 115, no. 1, 2008, pp. 104-112.
7. E. Lee, Y. Park, and J.G. Shin, "Large Engineering Project Risk Management Using a Bayesian Belief Network," Expert Systems with Applications, vol. 36, no. 3, 2009, pp. 5880-5887.
8. M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc. IEEE Conf. Security and Privacy (SP 96), IEEE CS Press, 1996, pp. 164-173.
9. D. Gambetta, "Can We Trust Trust?" Trust: Making and Breaking Cooperative Relations, Dept. Sociology, Univ. of Oxford, 2000, pp. 213-237.
10. A. J⊘sang, C. Keser, and T. Dimitrakos, "Can We Manage Trust?" iTrust 2005, LNCS 3477, Springer, 2005, pp. 93-107.
11. B. Solhaug, D. Elgesem, and K. St⊘len, "Why Trust Is Not Proportional to Risk," Proc. 2nd Int'l Conf. Availability, Reliability, and Security (ARES 07), IEEE CS Press, 2007, pp. 11-18.
12. A. Refsdal, B. Solhaug, and K. St⊘len, "A UML-Based Method for the Development of Policies to Support Trust Management," Proc. 2nd Joint iTrust and PST Conf. Privacy, Trust Management and Security (IFIPTM 08), vol. 263, Springer, 2008, pp. 33-49.

Index Terms:
Risk, trust and change management; risk assessment; Continuous-evolution, maintenance, and before-after perspectives
Citation:
Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen, "Evolution in Relation to Risk and Trust Management," Computer, vol. 43, no. 5, pp. 49-55, May 2010, doi:10.1109/MC.2010.134
Usage of this product signifies your acceptance of the Terms of Use.