A Study of Security Requirements Negotiation

被引:0
|
作者
Ye, Xinfeng [1 ]
机构
[1] Univ Auckland, Dept Comp Sci, Auckland 1, New Zealand
来源
2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM) | 2014年
关键词
security; service level agreement; game theory;
D O I
10.1109/DASC.2014.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In service computing, a system is integrated by using the services of many service providers. The security of the services that constitutes the system affects the security of the integrated system. This paper studied the issues relating to security requirements of an integrated system using a game theoretical approach. It modeled a class of service computing applications as a security game. Using the game, the service providers and the system owners can analyse the security level and the security investment of the system. Using the results of the analysis, the system owners and the service providers can be more objective in their service level agreement negotiation.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 50 条
  • [31] Analyzing and Evaluating Security Features in Software Requirements
    Malhotra, Ruchika
    Chug, Anuradha
    Hayrapetian, Allenoush
    Raje, Rajeev
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 26 - 30
  • [32] Security and Privacy in Video Surveillance: Requirements and Challenges
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 169 - 184
  • [33] Obtaining Security Requirements for a Mobile Grid System
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Lopez, Javier
    Piatini, Mario
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2009, 1 (03) : 1 - 17
  • [34] Security Architecture and Requirements for Wireless Sensor Networks
    Gong, Yiguang
    Ruan, Feng
    Fan, Zhiyong
    Hou, Jianmin
    Mei, Ping
    Li, Tao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 295 - 302
  • [35] Security requirements identification and prioritization for smart toys
    de Carvalho, Luciano Goncalves
    Fantinato, Marcelo
    Eler, Marcelo Medeiros
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2020, 41
  • [36] Complying with Security Requirements in Cloud Storage Systems
    Roman, Rodrigo
    Felipe, Miguel Rodel
    Gene, Phua Eu
    Zhou, Jianying
    JOURNAL OF COMPUTERS, 2016, 11 (03) : 201 - 206
  • [37] The Future of Metaverse: Security Issues, Requirements, and Solutions
    Choi, Min
    EL Azzaoui, Abir
    Singh, Sushil Kumar
    Salim, Mikail Mohammed
    Jeremiah, Sekione Reward
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [38] IoT Security (IoTSec) Considerations, Requirements, and Architectures
    Minoli, Daniel
    Sohraby, Kazem
    Kouns, Jacob
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 1006 - 1007
  • [39] Security Requirements in a Federated Cloud Networking Architecture
    Massonet, Philippe
    Levin, Anna
    Celesti, Antonio
    Villari, Massimo
    ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2015), 2016, 567 : 79 - 88
  • [40] Assessing Security Risk and Requirements for Systems of Systems
    Ki-Aries, Duncan
    2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 454 - 459