Quality of Security Service costing demonstration for the MSHN project
MetadataShow full item record
Security requirements for a task, system or network may permit the selection of a range of underlying services or security behaviors. When a range of services is available, variant security is possible. Variant security permits the notion of Quality of Security Service (QoSS) to be introduced. This paper describes a quality of security service demonstration, specifically with respect to costing. We describe the network as having three modes: normal, impacted, and emergency. For each of these modes, the user is given three possible security levels: low, medium and high. A variety of security services contribute to the overall security of each task. Each service has two costs: an initialization cost and a run-time cost. The demonstration illustrates the costs incurred as network modes and security levels are changed. High level and detailed specifications are provided.
NPS Report NumberNPS-CS-00-007
Showing items related by title, author, creator and subject.
Sypropoulou, Evdoxia; Agar, Chris; Levin, Timothy E.; Irvine, Cynthia E. (15th International Parallel and Distributed Processing Symposium (IPDPS 2001), 10th Heterogeneous Computing Workshop (HCW 2001), (San Francisco, CA), pp. 810?823, IEEE Computer Society, April 2001.(, 2002-03-13);This paper discusses the modulation of security services in response to changes in network conditions or as a result of modified user or application security requirements. First, the notion of security variability and how ...
Levin, Timothy; Irvine, Cynthia; Spyropoulou, Evdoxia (2012-05-07);The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks. In ...
Levin, Timothy E.; Irvine, Cynthia E. (John Wiley and Sons, Inc., 2005-05-00);The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks. In this ...