Toward a taxonomy and costing method for security services

A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource management systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services all RMS needs to manage, a preliminary security service taxonomy is defined. The taxonomy is used as a framework for defining the costs associated with network security services.

[1]  Jeremiah P. Ostriker,et al.  Cosmology of the early universe viewed through the new infrastructure , 1997, CACM.

[2]  William A. Wulf,et al.  TOWARDS A FRAMEWORK FOR SECURITY MEASUREMENT , 1997 .

[3]  Bruce Schneier,et al.  The Twofish encryption algorithm: a 128-bit block cipher , 1999 .

[4]  Viktor K. Prasanna,et al.  A QoS performance measure framework for distributed heterogeneous networks , 2000, Proceedings 8th Euromicro Workshop on Parallel and Distributed Processing.

[5]  Thomas F. Lawrence,et al.  Taxonomy for QoS specifications , 1997, Proceedings Third International Workshop on Object-Oriented Real-Time Dependable Systems.

[6]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[7]  Daniel F. Sterne,et al.  On the buzzword 'security policy' , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  Nalini Venkatasubramanian,et al.  An integrated metric for video QoS , 1997, MULTIMEDIA '97.

[9]  Chaplin,et al.  Quality of Security Service in a Resource Management System Benefit Function Report Documentation Page , .

[10]  S. H. Banks,et al.  Security policy , 1990, Comput. Secur..

[11]  Cynthia E. Irvine,et al.  A note on mapping user-oriented security policies to complex mechanisms and services , 1999 .

[12]  Ian T. Foster,et al.  Globus: a Metacomputing Infrastructure Toolkit , 1997, Int. J. High Perform. Comput. Appl..

[13]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[14]  Cynthia E. Irvine,et al.  Toward quality of security service in a resource management system benefit function , 2000, Proceedings 9th Heterogeneous Computing Workshop (HCW 2000) (Cat. No.PR00556).

[15]  Miron Livny,et al.  Condor-a hunter of idle workstations , 1988, [1988] Proceedings. The 8th International Conference on Distributed.

[16]  Michael W. Godfrey,et al.  An overview of MSHN: the Management System for Heterogeneous Networks , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).