skip to main content
10.1145/366173.366195acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Quality of security service

Published: 20 February 2001 Publication History
First page of PDF

References

[1]
--, Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture, International Organization for Standardisation, ISO 7498-2, 1989]]
[2]
Anderson, J.P., Computer Security Technology Planning Study. Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA, 1972. (Also available as Vol. I, DITCAD-758206, Vol. II DITCAD- 772806).]]
[3]
Aurrecoechea, C., Campbell, A., and Hauw, L. A Survey of Quality of Service Architectures, Multimedia Systems Journal, Special Issue on QoS Architectures, 1996.]]
[4]
Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A., The KeyNote Trust-Management System, version 2, RFC 2704, September 1999. ftp://ftp.ietf.org/internet-drafts/ draft -blaze-itef-trustmgmt-keynote-02.txt]]
[5]
Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A., The Role of Trust Management in Distributed System Security, to appear in Secure lnternet Programming: Security Issues for Mobile and Distributed Objects, ed. Jan Vitek and Christian Jensen, Springer-Verlag Inc., New York, NY.]]
[6]
Brinkley, D.L. and Schell, R. R., Concepts and Terminology for Computer Security, in Information Security: An Integrated Collection of Essays, ed. Abrams, Jajodia and Podell, IEEE Computer Society Press, Los Alamitos, CA, 1995, pp. 40-97.]]
[7]
Chatterjee, S., Sabata, B., Sydir, J. ERDoS QoS Architecture, SRI Technical Report ITAD- 1667-TR-98-075, Menlo Park, CA, May 1998.]]
[8]
Hensgen, D., Kidd, T., St. John, D., Schnaidt, M., Siegel, H.J., Braun, T., Kim, J-K, All, S., Cynthia Irvine, Tim Levin, Prasanna, V., Bhat, P., Freund, R., and Gherrity, M., An Overview of the Management System for Heterogeneous Networks (MSHN), Proceedings of the Heterogeneous Computing Workshop (HCW '99), San Juan, Puerto Rico, Apr. 1999]]
[9]
Irvine, C., and Levin, T., A Note on Mapping User-Oriented Security Policies to Complex Machanisms and Services, NPS Technical Report NPS-CS-99-008, 15 June 1999]]
[10]
Irvine, C., and Levin, T., Toward a Taxonomy and Costing Method for Security Metrics, Proceedings of the Annual Computer Security Applications Conference, Phoenix, AZ, Dec. 1999]]
[11]
Irvine, C., and Levin, T., Toward Quality of Security Service in a Resource Management System Benefit Function, Proceedings of the Heterogeneous Computing Workshop, Cancun, Mexico, May 1. 2000]]
[12]
E. Jensen, C. Locke, and H. Tokuda, A Time-driven Scheduling Model for Real-Time Operating Systems, in Proceedings of the IEEE Real-Time Systems Symposium, December 1985.]]
[13]
Juneman, R. R., Novell Certificate Extension Attributes- Novel Security Attributes. Tutorial and Detailed Design. Version 0.998, Novell, Inc. 122 East 1700 St., Provo, UT, August 1997.]]
[14]
Jong-Kook Kim, Debra A. Hensgen, Taylor Kidd, Howard Jay Siegel, David St. John, Cynthia Irvine, Tim Levin, N. Wayne Porter, Viktor K. Prasanna, and Richard E Freund. A QoS Performance Measure Framework for Distributed Heterogeneous Networks, In Proceedings of the Eighth Euromicro Workshop on Parallel and Distributed Processing, pages 18-27, Rhodes, Greece, January 2000.]]
[15]
Lee, C. Kesselman, C., Stepanek, J., Lindell, R., Hwang, S., Scott Michel, B., Bannister, J., Foster, I., and Roy, A. The Quality of Service Component for the Globus Metacomputing System, in Proceeding of the 1998 International Workshop on Quality of Serv&e, Napa California, pp. 140-142, May, 1998.]]
[16]
Linn, J., Genetic Security Service Application Program Interface, IETF Request for Comments: 1508, September 1993]]
[17]
Sabata, B., Chatterjee, S., Davis, M., Sydir, J., Lawrence, T. Taxonomy for QoS Specifications, Proceedings of the Third International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS'97), February 5-7, 1997, Newport Beach, Ca., pages 100-107.]]
[18]
Sargent, R., CDSA Explained: An Indispensable Guide to Common Data Security Architecture, The Open Group, Reading, Berkshire, UK, 1998.]]
[19]
Schneck, P. A., and Schwan, K., Dynamic Authentication for High-Performance Networked Applications, Georgia Institute of Technology College of Computing Technical Report GIT-CC-98-08, 1998.]]
[20]
Siegel, H.J. and Ali, S., Techniques for Mapping Tasks to Machines in Heterogeneous Computing Systems, to appear in Journal of Systems Architecture, Special Issue on Heterogeneous Distributed and Parallel Architectures: Hardware, Software and Design Tools.]]
[21]
Stankovic, J. A., M. Supri, M., Ramamritham, K., and Buttazo, G. C., Deadline Scheduling for Real-time Systems, Kluwer Academic Publishers, Norwell MA, 1998, pp. 13- 22.]]
[22]
Vendatasubramanian, N. and Nahrstedt, K., An Integrated Metric for Video QoS, Proceedings of the ACM International Multimedia Conference, Seattle, Wa., Nov. 1997.]]
[23]
Welch, L., Shirazi, B., and Ravindran, B., DeSiDeRaTa: QoS Management Technology For Dynamic, Scalable, Dependable, Real-Time Systems, in Proceedings of the 15th Symposium on Distributed Computer Control Systems (DCCS'98), IFAC, Sept. 1998.]]
[24]
Xie, G., Irvine, C., and Colwell, C., A Protocol for High Speed Packet Authentication, NPS Technical Report NPS- CS-99-001, August 1999.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
NSPW '00: Proceedings of the 2000 workshop on New security paradigms
February 2001
168 pages
ISBN:1581132603
DOI:10.1145/366173
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 February 2001

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. quality of security service
  2. quality of service
  3. security range
  4. variant security

Qualifiers

  • Article

Conference

NSPW00
Sponsor:
NSPW00: New Security Paradigms 2000
September 18 - 21, 2000
Ballycotton, County Cork, Ireland

Acceptance Rates

NSPW '00 Paper Acceptance Rate 15 of 35 submissions, 43%;
Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)3
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media