메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Negotiation of security services: A multi-criteria decision approach

Author keywords

Adaptive systems; AHP; Analytic hierarchy process; Cryptographic algorithm selection; Cryptography; Quality of service; Security; Utility function

Indexed keywords

ADAPTIVE PROTOCOL; AHP - ANALYTIC HIERARCHY PROCESS; CRYPTOGRAPHIC ALGORITHMS; ENERGY AWARE; ENERGY EFFICIENT; MOBILE SYSTEMS; MULTI-CRITERIA; MULTICRITERIA DECISION; RESOURCE-CONSTRAINED; SECURITY SERVICES; SECURITY SETTINGS; SECURITY SOLUTIONS; SELECTION MECHANISM; UTILITY FUNCTIONS;

EID: 72249104026     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1631716.1631720     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 1
    • 23344432021 scopus 로고    scopus 로고
    • Prioritised best effort routing with four quality of service metrics applying the concept of the analytic hierarchy process
    • A. M. S. Alkahtani, M. E. Woodward, and K. Al-Begain. Prioritised best effort routing with four quality of service metrics applying the concept of the analytic hierarchy process. Comput. Oper. Res., 33(3):559-580, 2006.
    • (2006) Comput. Oper. Res , vol.33 , Issue.3 , pp. 559-580
    • Alkahtani, A.M.S.1    Woodward, M.E.2    Al-Begain, K.3
  • 5
    • 72249123138 scopus 로고    scopus 로고
    • i. W. Chenx and W. William. Towards a framework for security measurements. In 20th National Information Systems Security Conference (NISSC), Baltimore, Maryland, October 1997.
    • i. W. Chenx and W. William. Towards a framework for security measurements. In 20th National Information Systems Security Conference (NISSC), Baltimore, Maryland, October 1997.
  • 7
    • 72249102981 scopus 로고    scopus 로고
    • The energy cost of ssl in deeply embedded systems
    • Technical Report TR-2008-173, SUN Microsystems, June
    • V. Gupta and M. Wurm. The energy cost of ssl in deeply embedded systems. Technical Report TR-2008-173, SUN Microsystems, June 2008.
    • (2008)
    • Gupta, V.1    Wurm, M.2
  • 10
    • 72249120349 scopus 로고    scopus 로고
    • Use of multi-attribute utility functions in evaluating security systems
    • Technical Report LLNL-TR-405048, Lawrence Livermore National Laboratory LLNL, Livermore, CA, June, 13
    • C. Meyers, A. Lamont, and A. Sicherman. Use of multi-attribute utility functions in evaluating security systems. Technical Report LLNL-TR-405048, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, June, 13 2008.
    • (2008)
    • Meyers, C.1    Lamont, A.2    Sicherman, A.3
  • 11
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • Feb
    • N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. Mobile Computing, IEEE Transactions on, 5(2):128-143, Feb. 2006.
    • (2006) Mobile Computing, IEEE Transactions on , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.1    Ravi, S.2    Raghunathan, A.3    Jha, N.4
  • 13
    • 33645354309 scopus 로고    scopus 로고
    • Comparative study of protocols for dynamic service negotiation in the next-generation internet
    • March
    • V. Sarangan and J.-C. Chen. Comparative study of protocols for dynamic service negotiation in the next-generation internet. IEEE, Communications Magazine, 44(3):151-156, March 2006.
    • (2006) IEEE, Communications Magazine , vol.44 , Issue.3 , pp. 151-156
    • Sarangan, V.1    Chen, J.-C.2
  • 14
    • 72249100558 scopus 로고
    • An integrated cache and memory access time, cycle time, area, leakage, and dynamic power model
    • Technical report, Western Research Laboratory, Palo Alto, California, June
    • S. J. Wilton and N. P. Jouppi. An integrated cache and memory access time, cycle time, area, leakage, and dynamic power model. Technical report, Western Research Laboratory, Palo Alto, California, June 1994.
    • (1994)
    • Wilton, S.J.1    Jouppi, N.P.2
  • 15
    • 32544459888 scopus 로고    scopus 로고
    • Dynamically negotiated security service for multicast application in the active network
    • 2 Feb
    • Z. Y. Xia, J. Wang, and X. L. Qin. Dynamically negotiated security service for multicast application in the active network. IEE Proceedings-Communications, 153(1):31-38, 2 Feb. 2006.
    • (2006) IEE Proceedings-Communications , vol.153 , Issue.1 , pp. 31-38
    • Xia, Z.Y.1    Wang, J.2    Qin, X.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.