Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00)
DOI: 10.1109/acsac.2000.898888
|View full text |Cite
|
Sign up to set email alerts
|

Calculating costs for quality of security service

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 11 publications
(15 reference statements)
0
7
0
Order By: Relevance
“…Although the concept has existed more than a decade, it is not clearly known yet how to measure the quality of general security service. Spyropoulou et al [17] have proposed the notion of QoSS (Quality of Security Service). Ideally, a system administrator and a security officer can select an appropriate security scheme to optimize the cost-benefit relation, when a quantitative model showing the computational cost and benefit of a security service is given.…”
Section: Related Workmentioning
confidence: 99%
“…Although the concept has existed more than a decade, it is not clearly known yet how to measure the quality of general security service. Spyropoulou et al [17] have proposed the notion of QoSS (Quality of Security Service). Ideally, a system administrator and a security officer can select an appropriate security scheme to optimize the cost-benefit relation, when a quantitative model showing the computational cost and benefit of a security service is given.…”
Section: Related Workmentioning
confidence: 99%
“…Generally, the quality of security service can only be measured qualitatively unlike real-time performance. Spyropoulou et al [20] have proposed the notion of QoSS (Quality of Security Service). Ideally, a system administrator and a security officer can select an appropriate security scheme to optimize the cost-benefit relation, when a quantitative model showing the computational cost and benefit of a security service is given.…”
Section: Related Workmentioning
confidence: 99%
“…This approach for quantifying the costs related to a task's security requests (Spyropoulou, Levin, Irvine, 2000) refers to costs relative to every security service invoked by the task. Each service may access CPU time, memory, bandwidth, disk space, etc.…”
Section: Costingmentioning
confidence: 99%
“…One approach (described in detail in Spyropoulou, Agar, Levin, Irvine, 2002) is to use a trust management system (Blaze, Feigenbaum, Ioannidis, Keromytis, 1999) and an external dynamic parameter console to modulate the detailed IPsec security attributes. The dynamic parameter console interacts with the external environment, such as an administrator or an intrusion detection system, to receive the current selections for the network mode and security level, and to pass the selections to the trust management system.…”
Section: Examination Of Resource Modulationmentioning
confidence: 99%