[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/784590.784683guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Toward a Taxonomy and Costing Method for Security Services

Published: 06 December 1999 Publication History

Abstract

A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage, a preliminary security service taxonomy is defined. The taxonomy is used as a framework for defining the costs associated with network security services.

Cited By

View all
  1. Toward a Taxonomy and Costing Method for Security Services

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ACSAC '99: Proceedings of the 15th Annual Computer Security Applications Conference
    December 1999
    ISBN:0769503462

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 06 December 1999

    Author Tags

    1. network security service
    2. quality of security service
    3. resource management system
    4. security cost
    5. security taxonomy

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Test-Based Security Certification of Composite ServicesACM Transactions on the Web10.1145/326746813:1(1-43)Online publication date: 4-Dec-2018
    • (2015)From Security to Assurance in the CloudACM Computing Surveys10.1145/276700548:1(1-50)Online publication date: 22-Jul-2015
    • (2013)A test-based security certification scheme for web servicesACM Transactions on the Web10.1145/2460383.24603847:2(1-41)Online publication date: 29-May-2013
    • (2012)Security-aware scheduling model for computational gridConcurrency and Computation: Practice & Experience10.1002/cpe.185024:12(1377-1391)Online publication date: 1-Aug-2012
    • (2011)Improving adaptivity and fairness of processing real-time tasks with QoS requirements on clusters through dynamic schedulingInformation Processing Letters10.1016/j.ipl.2011.03.020111:12(609-613)Online publication date: 1-Jun-2011
    • (2010)SAQAProceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing10.1109/CCGRID.2010.64(224-232)Online publication date: 17-May-2010
    • (2008)QDSLACM SIGMETRICS Performance Evaluation Review10.1145/1384529.137549036:1(289-300)Online publication date: 2-Jun-2008
    • (2008)QDSLProceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems10.1145/1375457.1375490(289-300)Online publication date: 2-Jun-2008
    • (2007)StReDFuture Generation Computer Systems10.1016/j.future.2006.12.00723:6(816-824)Online publication date: 1-Jul-2007
    • (2006)Scheduling Security-Critical Real-Time Applications on ClustersIEEE Transactions on Computers10.1109/TC.2006.11055:7(864-879)Online publication date: 1-Jul-2006
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media