Quality of Security Service: Adaptive Security

Timothy E. Levin and Cynthia E. Irvine, Naval Postgraduate School

Evdoxia Spyropoulou, Technical Vocational Educational School of Computer Science of Halandri Greece




Quality of Security Service

Security Ranges

QOSS Model

Security Resources, Services, and Requirements

Task Sequences

Security Limits and Choices

Security Range Relationships

QOSS Applied


Examination of Resource Modulation

QOSS and Application-centric Security

Related Work



Cross References



The purpose of this chapter is to provide an overview, rationale, and motivation for understanding quality of security service (QoSS). Just as with the quality of service (QoS) mechanisms from which they are derived, QoSS mechanisms benefit both the subscriber (e.g., individual user or enterprise) and the overall distributed system. Users benefit by having reliable access to services, and the distributed systems whose resources are QoSS-managed may benefit by having more predictable resource utilization by users and more efficient resource allocation. Thus, the QoSS vision is to transform security from a performance obstacle into an adaptive, constructive network management tool.


Most of today's distributed and highly populated computing environments, as exemplified by the Internet, face challenges with security as well as with the management and availability of resources. Bandwidth in mobile ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.