A Study of Security Requirements Negotiation

被引:0
作者
Ye, Xinfeng [1 ]
机构
[1] Univ Auckland, Dept Comp Sci, Auckland 1, New Zealand
来源
2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM) | 2014年
关键词
security; service level agreement; game theory;
D O I
10.1109/DASC.2014.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In service computing, a system is integrated by using the services of many service providers. The security of the services that constitutes the system affects the security of the integrated system. This paper studied the issues relating to security requirements of an integrated system using a game theoretical approach. It modeled a class of service computing applications as a security game. Using the game, the service providers and the system owners can analyse the security level and the security investment of the system. Using the results of the analysis, the system owners and the service providers can be more objective in their service level agreement negotiation.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 50 条
  • [41] Security Requirements in a Federated Cloud Networking Architecture
    Massonet, Philippe
    Levin, Anna
    Celesti, Antonio
    Villari, Massimo
    ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2015), 2016, 567 : 79 - 88
  • [42] Security requirements for mobile agents in electronic markets
    Zapf, M
    Müller, H
    Geihs, K
    TRENDS IN DISTRIBUTED SYSTEMS FOR ELECTRONIC COMMERCE, 1998, 1402 : 205 - 217
  • [43] Assessing Security Risk and Requirements for Systems of Systems
    Ki-Aries, Duncan
    2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 454 - 459
  • [44] Complying with Security Requirements in Cloud Storage Systems
    Roman, Rodrigo
    Felipe, Miguel Rodel
    Gene, Phua Eu
    Zhou, Jianying
    JOURNAL OF COMPUTERS, 2016, 11 (03) : 201 - 206
  • [45] Security requirements identification and prioritization for smart toys
    de Carvalho, Luciano Goncalves
    Fantinato, Marcelo
    Eler, Marcelo Medeiros
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2020, 41
  • [46] The Future of Metaverse: Security Issues, Requirements, and Solutions
    Choi, Min
    EL Azzaoui, Abir
    Singh, Sushil Kumar
    Salim, Mikail Mohammed
    Jeremiah, Sekione Reward
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [47] Privacy, Security, Soft Requirements, and Flaky Tests
    Staron, Miroslaw
    Abrahao, Silvia
    Honnenahalli, Chetan
    Horkoff, Jennifer
    IEEE SOFTWARE, 2023, 40 (05) : 117 - 120
  • [48] Evaluating Cryptographic Security Requirements in IoT Gateways
    Felix, Eduardo F.
    Lins, Fernando A. A.
    Gomes, Diego R.
    Nobrega, Obionor O.
    Jesus, Bruno A.
    Vieira, Marco
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [49] Integrating security and usability into the requirements and design process
    Flechais, Ivan
    Mascolo, Cecilia
    Sasse, M. Angela
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 12 - 26
  • [50] Security Requirements Specification: A Formal Method Perspective
    Mishra, Aditya Dev
    Mustafa, K.
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 113 - 117