Journal of Optimization Theory and Applications
Security service level agreements: quantifiable security for the enterprise?
Proceedings of the 1999 workshop on New security paradigms
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Journal of Systems and Software
Towards optimal and efficient perfectly secure message transmission
TCC'07 Proceedings of the 4th conference on Theory of cryptography
SLA Perspective in Security Management for Cloud Computing
ICNS '10 Proceedings of the 2010 Sixth International Conference on Networking and Services
Multiobjective monitoring for SLA compliance
IEEE/ACM Transactions on Networking (TON)
Applying Bargaining Game Theory to Web Services Negotiation
SCC '10 Proceedings of the 2010 IEEE International Conference on Services Computing
Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach
Perfectly Secure Message Transmission Revisited
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Service level agreements occasionally come as qualitative claims rather than quantitative statements. Motivated by the well-known fact that different (security) service goals can be conflicting, we present an axiomatic approach to finding an optimal balance between interdependent service quality criteria with distinct performance indicators. As a by-product, we obtain network provisioning strategies that ensure the promised service level at optimized performance. Our results generally apply to any security infrastructure for which attack and provisioning strategy identification is feasible. Standard security audits can thus be exploited twice, because, apart from forming a convincing sales argument, they directly support security service level agreements.