2011 IEEE Symposium on Computers and Communications (ISCC) 2011
DOI: 10.1109/iscc.2011.5983912
|View full text |Cite
|
Sign up to set email alerts
|

Exploitation of auctions for outsourcing security-critical projects

Abstract: ICT outsourcing may introduce several risks. This paper attempts to mitigate this problem by applying an auctioning scheme. By adopting the scheme, the involved organization selects one or more potential outsourced service providers via an auction similar to the FCC spectrum ones. The project is divided in sub-projects, bidders are pre-evaluated, in terms of security and each bid is assessed in terms of cost and appropriate security metrics. The bidding process continues according to the auction rules allocati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
3

Relationship

3
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…When specific people involved in given task, it is easy to detect and identify the malicious intension of insider [8] [9]. If employee is going to perform a computer fraud, it is hard to do among them during the work hours and chance of catching them is easy.…”
Section: Whirling Of Dutiesmentioning
confidence: 99%
“…When specific people involved in given task, it is easy to detect and identify the malicious intension of insider [8] [9]. If employee is going to perform a computer fraud, it is hard to do among them during the work hours and chance of catching them is easy.…”
Section: Whirling Of Dutiesmentioning
confidence: 99%
“…The generic model of cloud environment provides facilities for clients to store their sensitive data, software as service (software is provided as service from cloud provider), platform as service (platform is provided as service) [6] [7] and infrastructure as service. In general the organizations want to use cloud services in a secure manner instead of purchase products [10].…”
Section: Generic Modelmentioning
confidence: 99%
“…Furthermore, the field of risk assessment/management and critical infrastructure protection has contributed towards an elevated understanding over the issue [9][10]. Alternative approaches have, also, been proposed to this extend [11][12].…”
Section: Related Workmentioning
confidence: 99%