Calculating Costs for Quality of Security Service
Levin, Timothy E.
Irvine, Cynthia E.
MetadataShow full item record
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and retrieving security information is illustrated. We describe a security model for tasks, which incorporates the ideas of variant security services invoked by the task, dynamic network modes, abstract security level choices and resource utilization costs. The estimated costs can be fed into a resource management system to facilitate the process of estimating efficient task schedules. Integration and scalability issues have been taken into account during the design of the QoSS costing demonstration, which we believe is suitable for incorporation into a resource management system research prototype1.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Clark, Paul C. (Proceedings of the New Security Paradigms Workshop, 2000-10-00);This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and retrieving security information is illustrated. ...
Spyropoulou, Evie; Allen, Bruce; Agar, Chris; Smith, Kevin; Wu, Peter; Mohan, Raj (2006);Our research to support Quality of Security Service (QoSS) in Resource Management Systems (RMS) involves: How to map user security requirements to network security mechanism abstractions Understanding the range of security ...
Sypropoulou, Evdoxia; Agar, Chris; Levin, Timothy E.; Irvine, Cynthia E. (15th International Parallel and Distributed Processing Symposium (IPDPS 2001), 10th Heterogeneous Computing Workshop (HCW 2001), (San Francisco, CA), pp. 810?823, IEEE Computer Society, April 2001.(, 2002-03-13);This paper discusses the modulation of security services in response to changes in network conditions or as a result of modified user or application security requirements. First, the notion of security variability and how ...