A Study of Security Requirements Negotiation

Show simple item record

dc.contributor.author Ye, Xin en
dc.coverage.spatial Dalian, China en
dc.date.accessioned 2015-05-01T02:14:20Z en
dc.date.issued 2014-08-24 en
dc.identifier.citation IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC), Dalian, China, 24 Aug 2014 - 27 Aug 2014. Proceedings 2014 World Ubiquitous Science Congress. IEEE. 51-56. 24 Aug 2014 en
dc.identifier.isbn 978-1-4799-5078-2 en
dc.identifier.uri http://hdl.handle.net/2292/25365 en
dc.description.abstract In service computing, a system is integrated by using the services of many service providers. The security of the services that constitutes the system affects the security of the integrated system. This paper studied the issues relating to security requirements of an integrated system using a game theoretical approach. It modeled a class of service computing applications as a security game. Using the game, the service providers and the system owners can analyse the security level and the security investment of the system. Using the results of the analysis, the system owners and the service providers can be more objective in their service level agreement negotiation. en
dc.publisher IEEE en
dc.relation.ispartof IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC) en
dc.relation.ispartofseries Proceedings 2014 World Ubiquitous Science Congress en
dc.rights Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. Details obtained from http://www.ieee.org/publications_standards/publications/rights/rights_policies.html en
dc.rights.uri https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm en
dc.title A Study of Security Requirements Negotiation en
dc.type Conference Item en
dc.identifier.doi 10.1109/DASC.2014.18 en
pubs.begin-page 51 en
dc.description.version AM - Accepted Manuscript en
dc.rights.holder Copyright: IEEE en
pubs.end-page 56 en
pubs.finish-date 2014-08-27 en
pubs.start-date 2014-08-24 en
dc.rights.accessrights http://purl.org/eprint/accessRights/OpenAccess en
pubs.subtype Proceedings en
pubs.elements-id 467149 en
pubs.org-id Science en
pubs.org-id School of Computer Science en
pubs.record-created-at-source-date 2014-12-04 en


Files in this item

Find Full text

This item appears in the following Collection(s)

Show simple item record

Share

Search ResearchSpace


Browse

Statistics