Design of a Secure System Considering Quality of Service

Cited 4 time in webofscience Cited 4 time in scopus
  • Hit : 421
  • Download : 564
DC FieldValueLanguage
dc.contributor.authorHeo, Seon Dongko
dc.contributor.authorLee, Soojinko
dc.contributor.authorDoo, Seokjooko
dc.contributor.authorYoon, Hyun-Sooko
dc.date.accessioned2015-11-20T09:09:08Z-
dc.date.available2015-11-20T09:09:08Z-
dc.date.created2015-01-27-
dc.date.created2015-01-27-
dc.date.issued2014-12-
dc.identifier.citationSYMMETRY-BASEL, v.6, no.4, pp.938 - 953-
dc.identifier.issn2073-8994-
dc.identifier.urihttp://hdl.handle.net/10203/201045-
dc.description.abstractImprovements in networking technologies have provided users with useful information services. Such information services may bring convenience and efficiency, but might be accompanied by vulnerabilities to a variety of attacks. Therefore, a variety of research to enhance the security of the systems and get the services at the same time has been carried out. Especially, research on intrusion-tolerant systems (ITSs) has been conducted in order to survive against every intrusion, rather than to detect and prevent them. In this paper, an ITS based on effective resource conversion (ERC) is presented to achieve the goal of intrusion-tolerance. Instead of using the fixed number of virtual machines (VMs) to process requests and recover as in conventional approaches, the ITS based on ERC can transform the assigned resources depending on the system status. This scheme is proved to maintain a certain level of quality of service (QoS) and quality of security service (QoSS) in threatening environments. The performance of ERC is compared with previous studies on ITS by CSIM 20, and it is verified that the proposed scheme is more effective in retaining a specific level of QoS and QoSS.-
dc.languageEnglish-
dc.publisherMDPI AG-
dc.titleDesign of a Secure System Considering Quality of Service-
dc.typeArticle-
dc.identifier.wosid000346795100007-
dc.identifier.scopusid2-s2.0-84919639246-
dc.type.rimsART-
dc.citation.volume6-
dc.citation.issue4-
dc.citation.beginningpage938-
dc.citation.endingpage953-
dc.citation.publicationnameSYMMETRY-BASEL-
dc.identifier.doi10.3390/sym6040938-
dc.contributor.localauthorYoon, Hyun-Soo-
dc.contributor.nonIdAuthorLee, Soojin-
dc.contributor.nonIdAuthorDoo, Seokjoo-
dc.description.isOpenAccessY-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorquality of service-
dc.subject.keywordAuthorquality of security service-
dc.subject.keywordAuthorintrusion-tolerant system-
dc.subject.keywordAuthorresource conversion-
dc.subject.keywordAuthorvirtual machine-
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 4 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0