A Study of Security Requirements Negotiation

被引:0
作者
Ye, Xinfeng [1 ]
机构
[1] Univ Auckland, Dept Comp Sci, Auckland 1, New Zealand
来源
2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM) | 2014年
关键词
security; service level agreement; game theory;
D O I
10.1109/DASC.2014.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In service computing, a system is integrated by using the services of many service providers. The security of the services that constitutes the system affects the security of the integrated system. This paper studied the issues relating to security requirements of an integrated system using a game theoretical approach. It modeled a class of service computing applications as a security game. Using the game, the service providers and the system owners can analyse the security level and the security investment of the system. Using the results of the analysis, the system owners and the service providers can be more objective in their service level agreement negotiation.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 15 条
[1]   Security of interdependent and identical networked control systems [J].
Amin, Saurabh ;
Schwartz, Galina A. ;
Sastry, S. Shankar .
AUTOMATICA, 2013, 49 (01) :186-192
[2]  
Christin N., 2011, 15 INT C FIN CRYPT D, P16
[3]  
Florencio D., 2013, Economics of Information Security and Privacy III, P13
[4]   Uncertainty in the Weakest-Link Security Game [J].
Grossklags, Jens ;
Johnson, Benjamin .
2009 INTERNATIONAL CONFERENCE ON GAME THEORY FOR NETWORKS (GAMENETS 2009), 2009, :673-+
[5]  
Grossklags Jens., 2008, PROCEEDING 17 INT C, P209
[6]  
Guisheng Fan, 2013, 2013 IEEE International Conference on Services Computing (SCC), P659, DOI 10.1109/SCC.2013.110
[7]  
Khouzani MHR, 2013, IEEE INFOCOM SER, P818
[8]   Game Theory Meets Network Security and Privacy [J].
Manshaei, Mohammad Hossein ;
Zhu, Quanyan ;
Alpcan, Tansu ;
Basar, Tamer ;
Hubaux, Jean-Pierre .
ACM COMPUTING SURVEYS, 2013, 45 (03)
[9]   How many attackers can selfish defenders catch? [J].
Mavronicolas, Marios ;
Monien, Burkhard ;
Lesta, Vicky Papadopoulou .
DISCRETE APPLIED MATHEMATICS, 2013, 161 (16-17) :2563-2586
[10]   State of Cloud Applications and Platforms: The Cloud Adopters' View [J].
Narasimhan, Balakrishna ;
Nichols, Ryan .
COMPUTER, 2011, 44 (03) :24-28