Quality of Security Service: Adaptive Security
Levin, Timothy E.
Irvine, Cynthia E.
MetadataShow full item record
The purpose of this chapter is to provide an overview, rationale, and motivation for understanding quality of security service (QoSS). Just as with the quality of service (QoS) mechanisms from which they are derived, QoSS mechanisms benefit both the subscriber (e.g., individual user or enterprise) and the overall distributed system. Users benefit by having reliable access to services, and the distributed systems whose resources are QoSS-managed may benefit by having more predictable resource utilization by users and more efficient resource allocation. Thus, the QoSS vision is to transform security from a performance obstacle into an adaptive, constructive network management tool.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Irvine, Cynthia E.; Levin, Timothy E. (Monterey, California. Naval Postgraduate School, 1999); NPS-CS-00-005We examine the concept of security as a dimension of Quality of Service in distributed systems. We provide a discussion and examples of user- specified security variables and show how the range of service levels associated ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2005-09);September 2005. Welcome to the second issue of Homeland Security Affairs. The central theme is Hurricane Katrina. We also offer articles about critical infrastructure protection and capabilities based planning. One of ...
Spyropoulou, Evdoxia; Levin, Timothy; Irvine, Cynthia (Monterey, California. Naval Postgraduate School, 2000); NPS-CS-00-007Security requirements for a task, system or network may permit the selection of a range of underlying services or security behaviors. When a range of services is available, variant security is possible. Variant security ...