Quality of Security Service: Adaptive Security

Timothy E. Levin and Cynthia E. Irvine, Naval Postgraduate School

Evdoxia Spyropoulou, Technical Vocational Educational School of Computer Science of Halandri Greece

Introduction

Motivation

Background

Quality of Security Service

Security Ranges

QOSS Model

Security Resources, Services, and Requirements

Task Sequences

Security Limits and Choices

Security Range Relationships

QOSS Applied

Costing

Examination of Resource Modulation

QOSS and Application-centric Security

Related Work

Conclusion

Glossary

Cross References

References

INTRODUCTION

The purpose of this chapter is to provide an overview, rationale, and motivation for understanding quality of security service (QoSS). Just as with the quality of service (QoS) mechanisms from which they are derived, QoSS mechanisms benefit both the subscriber (e.g., individual user or enterprise) and the overall distributed system. Users benefit by having reliable access to services, and the distributed systems whose resources are QoSS-managed may benefit by having more predictable resource utilization by users and more efficient resource allocation. Thus, the QoSS vision is to transform security from a performance obstacle into an adaptive, constructive network management tool.

Motivation

Most of today's distributed and highly populated computing environments, as exemplified by the Internet, face challenges with security as well as with the management and availability of resources. Bandwidth in mobile ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.