dc.contributor.author |
Ye, Xin |
en |
dc.coverage.spatial |
Anchorage, AK |
en |
dc.date.accessioned |
2015-04-29T00:13:44Z |
en |
dc.date.issued |
2014-06-27 |
en |
dc.identifier.citation |
Services 2014, Anchorage, AK, 27 Jun 2014 - 02 Jul 2014. Proceedings 2014 IEEE Tenth World Congress on Services. IEEE. 224-231. 27 Jun 2014 |
en |
dc.identifier.isbn |
978-1-4799-5068-3 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/25325 |
en |
dc.description.abstract |
In service computing, a system can be built by integrating the services from different service providers. The security of such system is closely linked to the security of the services that make up the system. This paper studied the security investment of some service computing applications using a game theoretical approach. It proposed two security games for modeling two classes of service computing applications. Using the games, the service providers and their customers can analyse the security level and the security investment of a system. The results of the analysis should allow the customers and the service providers be more objective in their service level agreement negotiation, and make it easier for them to reach an agreement. |
en |
dc.publisher |
IEEE |
en |
dc.relation.ispartof |
Services 2014 |
en |
dc.relation.ispartofseries |
Proceedings 2014 IEEE Tenth World Congress on Services |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. Details obtained from http://www.ieee.org/publications_standards/publications/rights/rights_policies.html |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.title |
A Game-Theoretic Analysis of Security Investment for Service Computing Applications |
en |
dc.type |
Conference Item |
en |
dc.identifier.doi |
10.1109/SERVICES.2014.47 |
en |
pubs.begin-page |
224 |
en |
dc.description.version |
AM - Accepted Manuscript |
en |
dc.rights.holder |
Copyright:
IEEE |
en |
pubs.end-page |
231 |
en |
pubs.finish-date |
2014-07-02 |
en |
pubs.start-date |
2014-06-27 |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/OpenAccess |
en |
pubs.subtype |
Proceedings |
en |
pubs.elements-id |
467156 |
en |
pubs.org-id |
Science |
en |
pubs.org-id |
School of Computer Science |
en |
pubs.record-created-at-source-date |
2014-12-04 |
en |