A Game-Theoretic Analysis of Security Investment for Service Computing Applications

Show simple item record

dc.contributor.author Ye, Xin en
dc.coverage.spatial Anchorage, AK en
dc.date.accessioned 2015-04-29T00:13:44Z en
dc.date.issued 2014-06-27 en
dc.identifier.citation Services 2014, Anchorage, AK, 27 Jun 2014 - 02 Jul 2014. Proceedings 2014 IEEE Tenth World Congress on Services. IEEE. 224-231. 27 Jun 2014 en
dc.identifier.isbn 978-1-4799-5068-3 en
dc.identifier.uri http://hdl.handle.net/2292/25325 en
dc.description.abstract In service computing, a system can be built by integrating the services from different service providers. The security of such system is closely linked to the security of the services that make up the system. This paper studied the security investment of some service computing applications using a game theoretical approach. It proposed two security games for modeling two classes of service computing applications. Using the games, the service providers and their customers can analyse the security level and the security investment of a system. The results of the analysis should allow the customers and the service providers be more objective in their service level agreement negotiation, and make it easier for them to reach an agreement. en
dc.publisher IEEE en
dc.relation.ispartof Services 2014 en
dc.relation.ispartofseries Proceedings 2014 IEEE Tenth World Congress on Services en
dc.rights Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. Details obtained from http://www.ieee.org/publications_standards/publications/rights/rights_policies.html en
dc.rights.uri https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm en
dc.title A Game-Theoretic Analysis of Security Investment for Service Computing Applications en
dc.type Conference Item en
dc.identifier.doi 10.1109/SERVICES.2014.47 en
pubs.begin-page 224 en
dc.description.version AM - Accepted Manuscript en
dc.rights.holder Copyright: IEEE en
pubs.end-page 231 en
pubs.finish-date 2014-07-02 en
pubs.start-date 2014-06-27 en
dc.rights.accessrights http://purl.org/eprint/accessRights/OpenAccess en
pubs.subtype Proceedings en
pubs.elements-id 467156 en
pubs.org-id Science en
pubs.org-id School of Computer Science en
pubs.record-created-at-source-date 2014-12-04 en

Files in this item

Find Full text

This item appears in the following Collection(s)

Show simple item record


Search ResearchSpace