DOI: 10.1007/978-3-540-73547-2_13
|View full text |Cite
|
Sign up to set email alerts
|

Design of Service–Based Systems with Adaptive Tradeoff Between Security and Service Delay

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…However, our model can achieve the tradeoff by adjusting security configurations, which is much easier to control and will indirectly affect the resource allocation. The major distinction between our model and most existing approaches [8], [9], [10], [11], [12], [13], [14] is that our model can compute the best tradeoff by minimizing a tradeoff objective function which incorporates both service performance and security metrics, instead of intuitively switching from one security configuration to another until the desirable tradeoff is reached. Hence, our model can achieve the best tradeoff faster and does not need to change configuration frequently.…”
Section: Introductionmentioning
confidence: 99%
“…However, our model can achieve the tradeoff by adjusting security configurations, which is much easier to control and will indirectly affect the resource allocation. The major distinction between our model and most existing approaches [8], [9], [10], [11], [12], [13], [14] is that our model can compute the best tradeoff by minimizing a tradeoff objective function which incorporates both service performance and security metrics, instead of intuitively switching from one security configuration to another until the desirable tradeoff is reached. Hence, our model can achieve the best tradeoff faster and does not need to change configuration frequently.…”
Section: Introductionmentioning
confidence: 99%
“…Our approach to the tradeoff is to adjust the security parameters, such as key length and encrypting percentage, which are much easier to control. The major distinction between our approach and existing approaches (Lie & Satyanarayanan, 2007;Yurcik, Woolam, Hellings, Khan, & Thuraisingham, 2007;Lu, Lu, Abdelzaher, Stankovic, & Son, 2006;Kang & Son, 2006;Son, Zimmerman, & Hansson, 2000;Spyropoulou, Levin, & Irvine, 2000;Yau, Yan, & Huang, 2007) is that our approach can achieve the best tradeoff by minimizing a tradeoff objective function developed from service performance and security metrics, instead of intuitively trying all possible combinations of security parameters and monitoring the resulting performance and security until the desirable tradeoff is reached. Hence, our approach can achieve the best tradeoff fast and does not need to change security parameters frequently.…”
Section: Introductionmentioning
confidence: 99%