dc.contributor.author |
Ye, Xin |
en |
dc.coverage.spatial |
Dalian, China |
en |
dc.date.accessioned |
2015-05-01T02:14:20Z |
en |
dc.date.issued |
2014-08-24 |
en |
dc.identifier.citation |
IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC), Dalian, China, 24 Aug 2014 - 27 Aug 2014. Proceedings 2014 World Ubiquitous Science Congress. IEEE. 51-56. 24 Aug 2014 |
en |
dc.identifier.isbn |
978-1-4799-5078-2 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/25365 |
en |
dc.description.abstract |
In service computing, a system is integrated by using the services of many service providers. The security of the services that constitutes the system affects the security of the integrated system. This paper studied the issues relating to security requirements of an integrated system using a game theoretical approach. It modeled a class of service computing applications as a security game. Using the game, the service providers and the system owners can analyse the security level and the security investment of the system. Using the results of the analysis, the system owners and the service providers can be more objective in their service level agreement negotiation. |
en |
dc.publisher |
IEEE |
en |
dc.relation.ispartof |
IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC) |
en |
dc.relation.ispartofseries |
Proceedings 2014 World Ubiquitous Science Congress |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. Details obtained from http://www.ieee.org/publications_standards/publications/rights/rights_policies.html |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.title |
A Study of Security Requirements Negotiation |
en |
dc.type |
Conference Item |
en |
dc.identifier.doi |
10.1109/DASC.2014.18 |
en |
pubs.begin-page |
51 |
en |
dc.description.version |
AM - Accepted Manuscript |
en |
dc.rights.holder |
Copyright:
IEEE |
en |
pubs.end-page |
56 |
en |
pubs.finish-date |
2014-08-27 |
en |
pubs.start-date |
2014-08-24 |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/OpenAccess |
en |
pubs.subtype |
Proceedings |
en |
pubs.elements-id |
467149 |
en |
pubs.org-id |
Science |
en |
pubs.org-id |
School of Computer Science |
en |
pubs.record-created-at-source-date |
2014-12-04 |
en |