2011
DOI: 10.4018/jwsr.2011040104
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Approach to Optimizing Tradeoff Between Service Performance and Security in Service-Based Systems

Abstract: The message-based communication among services in Service-based Systems (SBS) is vulnerable to various security attacks and must be well protected by security mechanisms, which may affect performance due to available system resources. In this paper, an adaptive approach is presented to optimize the tradeoff between service performance and security according to SBS users’ requirements and preferences on performance and security. This adaptive approach is based on a tradeoff algorithm with quantitative performan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…This may improve the accuracy of predicted security breaches. Existing research on the intelligent planning for IoT and optimized tradeoff functions [27][28][29] can be leveraged for this study.…”
Section: Further Researchmentioning
confidence: 99%
“…This may improve the accuracy of predicted security breaches. Existing research on the intelligent planning for IoT and optimized tradeoff functions [27][28][29] can be leveraged for this study.…”
Section: Further Researchmentioning
confidence: 99%
“…The UV and IM of the devices in a mobile IoT application are calculated by the SESP using our objective tradeoff function [12] as shown in (3) and (4).…”
Section: Sesp Device State Analysismentioning
confidence: 99%
“…To overcome security issues in IoT m-Health devices, Doukas et al [48] employed a system based on digital certificates and Public Key Infrastructure (PKI) data encryption. An adaptive approach, as proposed by Yau et al [49], can also be used to prevent communication systems from various security attacks. Similarly, Templeton [50] addressed the issues of the security challenges in the increased use of cyber-physical devices in assistive environments.…”
Section: Introductionmentioning
confidence: 99%