A Study of Security Requirements Negotiation

被引:0
|
作者
Ye, Xinfeng [1 ]
机构
[1] Univ Auckland, Dept Comp Sci, Auckland 1, New Zealand
来源
2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM) | 2014年
关键词
security; service level agreement; game theory;
D O I
10.1109/DASC.2014.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In service computing, a system is integrated by using the services of many service providers. The security of the services that constitutes the system affects the security of the integrated system. This paper studied the issues relating to security requirements of an integrated system using a game theoretical approach. It modeled a class of service computing applications as a security game. Using the game, the service providers and the system owners can analyse the security level and the security investment of the system. Using the results of the analysis, the system owners and the service providers can be more objective in their service level agreement negotiation.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 50 条
  • [1] Ontology-based Negotiation of Security Requirements in Cloud
    Liccardo, Loredana
    Rak, Massimiliano
    Di Modica, Giuseppe
    Tomarchio, Orazio
    2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 192 - 197
  • [2] On Testing Security Requirements in Industry - A Survey Study
    Kopczynska, Sylwia
    Vieira, Daniel Craviee De Abreu
    Ochodek, Miroslaw
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2022, 2022, 13216 : 183 - 198
  • [3] A study on security requirements in digital home environment
    Kim, DW
    Han, JW
    Ju, HI
    Lee, YK
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 353 - 356
  • [4] An Exploratory Study Into the Negotiation of Cyber-Security Within the Family Home
    Muir, Kate
    Joinson, Adam
    FRONTIERS IN PSYCHOLOGY, 2020, 11
  • [5] A Systematic Mapping Study on Security in Agile Requirements Engineering
    Villamizar, Hugo
    Kalinowski, Marcos
    Viana, Marx
    Fernandez, Daniel Mendez
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 454 - 461
  • [6] Security Requirements and Solutions for IoT Gateways: A Comprehensive Study
    Lins, Fernando A. Aires
    Vieira, Marco
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (11) : 8667 - 8679
  • [7] A Security Ontology for Security Requirements Elicitation
    Souag, Amina
    Salinesi, Camille
    Mazo, Raul
    Comyn-Wattiau, Isabelle
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
  • [8] IMPLEMENTING THE REQUIREMENTS OF EXPERTS IN TO THE STUDY PROGRAMS IN THE FIELD OF SECURITY AND SAFETY
    Sventekova, Eva
    Luskova, Maria
    Gasparikova, Zuzana
    12TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION (ICERI 2019), 2019, : 3921 - 3925
  • [9] Meeting security and user behavior requirements in Grid scheduling
    Kolodziej, Joanna
    Xhafa, Fatos
    SIMULATION MODELLING PRACTICE AND THEORY, 2011, 19 (01) : 213 - 226
  • [10] Balancing Security Requirements and Emotional Requirements in Video Games
    Callele, David
    Neufeld, Eric
    Schneider, Kevin
    PROCEEDINGS OF THE 16TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, 2008, : 319 - 320