Toward Quality of Security Service in a Resource Management System Benefit Function
Irvine, Cynthia E.
Levin, Timothy E.
MetadataShow full item record
Enforcement of a high-level statement of security policy may be difficult to discern when mapped through functional requirements to a myriad of possible security ser- vices and mechanisms in a highly complex, networked environment. A method for articulating network security functional requirements, and their fulfillment, is presented. Using this method, security in a quality of service frame- work is discussed in terms of “variant” security mecha- nisms and dynamic security policies. For illustration, it is shown how this method can be used to represent Quality of Security Service (QoSS) in a network scheduler benefit function.
To Appear in Proceedings of the 2000 Heterogeneous Computing Workshop, May 2000.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Irvine, Cynthia E.; Levin, Timothy E. (Monterey, California. Naval Postgraduate School, 1999); NPS-CS-00-005We examine the concept of security as a dimension of Quality of Service in distributed systems. We provide a discussion and examples of user- specified security variables and show how the range of service levels associated ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2005-09);September 2005. Welcome to the second issue of Homeland Security Affairs. The central theme is Hurricane Katrina. We also offer articles about critical infrastructure protection and capabilities based planning. One of ...
Spyropoulou, Evdoxia; Levin, Timothy; Irvine, Cynthia (Monterey, California. Naval Postgraduate School, 2000); NPS-CS-00-007Security requirements for a task, system or network may permit the selection of a range of underlying services or security behaviors. When a range of services is available, variant security is possible. Variant security ...