메뉴 건너뛰기




Volumn 7037 LNCS, Issue , 2011, Pages 239-257

Modeling internet security investments: Tackling topological information uncertainty

Author keywords

Bayesian Nash equilibria; externality; security; uncertainty

Indexed keywords

ANTIVIRUS SOFTWARES; BAYESIAN NASH EQUILIBRIA; CONNECTIVITY STRUCTURES; DISTRIBUTED COMMUNICATIONS; EQUILIBRIUM BEHAVIOR; EXTERNALITY; INCOMPLETE INFORMATION; INTERNET SECURITY; INTERNET USERS; NEIGHBORING NODES; NETWORK NODE; NON-COOPERATIVE; PARTIAL INFORMATION; REALISTIC ENVIRONMENTS; RISK MANAGEMENT TECHNIQUES; SECURITY; SECURITY IMPROVEMENT; SECURITY INVESTMENTS; SECURITY MECHANISM; STRATEGIC INTERACTIONS; SUBMODULAR; SYSTEM SECURITY; TOPOLOGICAL INFORMATION; UNCERTAINTY; USER UTILITY;

EID: 81755188449     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25280-8_18     Document Type: Conference Paper
Times cited : (7)

References (50)
  • 1
    • 81755168899 scopus 로고    scopus 로고
    • System Reliability and Free Riding
    • Varian, H.: System Reliability and Free Riding. In: ACM ICEC (2003)
    • ACM ICEC (2003)
    • Varian, H.1
  • 2
    • 70349686853 scopus 로고    scopus 로고
    • Economic Incentives to Increase Security in the Internet: The Case for Insurance
    • Lelarge, M., Bolot, J.: Economic Incentives to Increase Security in the Internet: The Case for Insurance. In: IEEE INFOCOM (2009)
    • IEEE INFOCOM (2009)
    • Lelarge, M.1    Bolot, J.2
  • 3
    • 81755167562 scopus 로고    scopus 로고
    • Analyzing Self-Defense Investments in the Internet under Cyberinsurance Coverage
    • Pal, R., Golubchik, L.: Analyzing Self-Defense Investments In The Internet Under Cyberinsurance Coverage. In: IEEE ICDCS (2010)
    • IEEE ICDCS (2010)
    • Pal, R.1    Golubchik, L.2
  • 4
    • 79959243929 scopus 로고    scopus 로고
    • Modeling Cyberinsurance: Towards A Unifying Framework
    • Bohme, R., Schwartz, G.: Modeling Cyberinsurance: Towards A Unifying Framework. In: WEIS (2010)
    • WEIS (2010)
    • Bohme, R.1    Schwartz, G.2
  • 6
    • 67650416963 scopus 로고    scopus 로고
    • Protecting Against Network Infections: A Game-Theoretic Perspective
    • Omic, J., Orda, A., Mieghem, V.P.: Protecting Against Network Infections: A Game-Theoretic Perspective. In: IEEE INFOCOM (2009)
    • IEEE INFOCOM (2009)
    • Omic, J.1    Orda, A.2    Mieghem, V.P.3
  • 8
    • 81755162697 scopus 로고    scopus 로고
    • Security and Insurance Management in Networks with Heterogenous Agents
    • Grossklags, J., Christin, G., Chuang, J.: Security and Insurance Management in Networks with Heterogenous Agents. In: ACM EC (2008)
    • ACM EC (2008)
    • Grossklags, J.1    Christin, G.2    Chuang, J.3
  • 11
    • 70350389209 scopus 로고    scopus 로고
    • Blue versus Red: Towards a Model of Distributed Security Attacks
    • Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
    • Fultz, N., Grossklags, J.: Blue versus Red: Towards a Model of Distributed Security Attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167-183. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5628 , pp. 167-183
    • Fultz, N.1    Grossklags, J.2
  • 12
    • 57349198694 scopus 로고    scopus 로고
    • Secure or Insure? A Game-Theoretic Analysis of Information Security Games
    • Grossklags, J., Christin, N., Chuang, J.: Secure or Insure? A Game-Theoretic Analysis of Information Security Games. In: WWW (2008)
    • WWW (2008)
    • Grossklags, J.1    Christin, N.2    Chuang, J.3
  • 14
    • 81755170255 scopus 로고    scopus 로고
    • Who Should Be Responsible for Software Security?
    • Terrence, A., Tunca, I.T.: Who Should Be Responsible for Software Security? Management Science 57(5) (2011)
    • (2011) Management Science , vol.57 , Issue.5
    • Terrence, A.1    Tunca, I.T.2
  • 15
    • 70349977415 scopus 로고    scopus 로고
    • Uncertainty in Weakest-Link Security Game
    • Grossklags, J., Johnson, B.: Uncertainty In Weakest-Link Security Game. In: GameNets (2009)
    • (2009) GameNets
    • Grossklags, J.1    Johnson, B.2
  • 17
    • 77955321664 scopus 로고    scopus 로고
    • When Information Improves Information Security
    • Sion, R. (ed.) FC 2010. Springer, Heidelberg
    • Grossklags, J., Johnson, B., Christin, N.: When Information Improves Information Security. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 416-423. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6052 , pp. 416-423
    • Grossklags, J.1    Johnson, B.2    Christin, N.3
  • 18
    • 78049362316 scopus 로고    scopus 로고
    • Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information
    • Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
    • Johnson, B., Grossklags, J., Christin, N., Chuang, J.: Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 588-606. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6345 , pp. 588-606
    • Johnson, B.1    Grossklags, J.2    Christin, N.3    Chuang, J.4
  • 19
    • 78650721633 scopus 로고    scopus 로고
    • Uncertainty in Interdependent Security Games
    • Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. Springer, Heidelberg
    • Johnson, B., Grossklags, J., Christin, N., Chuang, J.: Uncertainty in Interdependent Security Games. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 234-244. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6442 , pp. 234-244
    • Johnson, B.1    Grossklags, J.2    Christin, N.3    Chuang, J.4
  • 20
    • 18744389789 scopus 로고    scopus 로고
    • Assortative Mixing in Networks
    • Newman, M.E.J.: Assortative Mixing in Networks. Phy. Rev. Lett. 89 (2002)
    • (2002) Phy. Rev. Lett. , vol.89
    • Newman, M.E.J.1
  • 33
    • 0344792106 scopus 로고    scopus 로고
    • Managing Online Security Risks
    • June 1
    • Varian, H.: Managing Online Security Risks. The New York Times (June 1, 2000)
    • (2000) The New York Times
    • Varian, H.1
  • 35
    • 85020616309 scopus 로고
    • Network Externalities, Competition, and Compatibility
    • Katz, M., Shapiro, C.: Network Externalities, Competition, and Compatibility. The American Economic Review 75(3) (1985)
    • (1985) The American Economic Review , vol.75 , Issue.3
    • Katz, M.1    Shapiro, C.2
  • 37
    • 84900406382 scopus 로고    scopus 로고
    • Cyberinsurance As A Market-Based Solution to the Problem of Cyber-Security: A Case Study
    • Kesan, J., Majuca, R., Yurcik, W.: Cyberinsurance As A Market-Based Solution To The Problem of Cyber-Security: A Case Study. In: WEIS (2005)
    • WEIS (2005)
    • Kesan, J.1    Majuca, R.2    Yurcik, W.3
  • 38
  • 39
    • 84941158228 scopus 로고    scopus 로고
    • Cyberinsurance: A Market Solution to the Internet Security Market Failure
    • Yurcik, W., Doss, D.: Cyberinsurance: A Market Solution To The Internet Security Market Failure. In: WEIS (2002)
    • WEIS (2002)
    • Yurcik, W.1    Doss, D.2
  • 40
    • 78649633532 scopus 로고    scopus 로고
    • Cyberinsurance As An Incentive for Internet Security
    • Lelarge, M., Bolot, J.: Cyberinsurance As An Incentive for Internet Security. In: WEIS (2008)
    • WEIS (2008)
    • Lelarge, M.1    Bolot, J.2
  • 42
    • 50149103364 scopus 로고    scopus 로고
    • Insurance and the Computer Industry
    • Schneier, B.: Insurance and the Computer Industry. Communications of the ACM 44(3) (2001)
    • (2001) Communications of the ACM , vol.44 , Issue.3
    • Schneier, B.1
  • 43
    • 84944232084 scopus 로고    scopus 로고
    • Interdependence of Reliability and Security
    • Honeyman, P., Schwarz, G.: Interdependence of Reliability and Security. In: WEIS (2007)
    • WEIS (2007)
    • Honeyman, P.1    Schwarz, G.2
  • 46
    • 43249108668 scopus 로고    scopus 로고
    • When is A Coinsurance-Type Insurance Policy Inferior or even Giffen
    • Hau, A.: When is A Coinsurance-Type Insurance Policy Inferior or Even Giffen. Journal of Risk and Insurance 75(2) (2008)
    • (2008) Journal of Risk and Insurance , vol.75 , Issue.2
    • Hau, A.1
  • 47
    • 81755183140 scopus 로고    scopus 로고
    • A Local Mean Field Analysis of Security Investments in Networks
    • Lelarge, M., Bolot, J.: A Local Mean Field Analysis of Security Investments in Networks. In: ACM NetEcon (2008)
    • (2008) ACM NetEcon
    • Lelarge, M.1    Bolot, J.2
  • 48
    • 57349135233 scopus 로고    scopus 로고
    • Network Externalities and the Deployment of Security Features and Protocols in the Internet
    • Lelarge, M., Bolot, J.: Network Externalities and The Deployment of Security Features and Protocols in the Internet. In: ACM SIGMETRICS (2008)
    • ACM SIGMETRICS (2008)
    • Lelarge, M.1    Bolot, J.2
  • 49
    • 81755162682 scopus 로고    scopus 로고
    • Internet Wikipedia Source
    • Internet Wikipedia Source. Information Asymmetry
    • Information Asymmetry


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.