Security has traditionally been thought of as a system or network attribute that was the result of the joint endeavors of the designer, maintainer and user, among others. Even though security can never reach a level of 100%, the aim has been to provide as much security as possible, given the boundary conditions in question. With the advent of, e.g., many low-power computing and communication devices it has become desirable to trade security against other system parameters, such as performance and power consumption. Thus, in many situations, tunable or selectable security, rather than maximal security, is desirable. The overall focus of this thesis is therefore how security with tunable level could be achieved and traded against other parame...
Recent research indicates that during the design of teleinformatic system the tradeoff between the s...
In a Quality of Service (QoS) aware communication system, a user is able to choose between various s...
It is understood that ICT security can be defined and enforced through rules. In this paper, the con...
Abstract 1. We examine the concept of security as a dimension of Quality of Service in distributed s...
Although not common today, communications networks could adjust security postures based on changing ...
Many security services today only provides one security configuration at run-time, and cannot then u...
This paper discusses the modulation of security services in response to changes in network condition...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
Abstract — This paper analyzes three existing tunable security services based on a conceptual model....
In today’s society, serious organizations need protection against both internal and external attacks...
Quite often failures in network based services and server systems may not be accidental, but rather ...
The basic idea of QoS is to provide mechanisms that can offer different service levels, which are ex...
The new opportunities that come with the Internet as a worldwide network bring the new threats and r...
Historically the trustworthiness of a computer system was characterized by its reliability and avail...
Historically security has developed as a discipline, separate from the original dependability framew...
Recent research indicates that during the design of teleinformatic system the tradeoff between the s...
In a Quality of Service (QoS) aware communication system, a user is able to choose between various s...
It is understood that ICT security can be defined and enforced through rules. In this paper, the con...
Abstract 1. We examine the concept of security as a dimension of Quality of Service in distributed s...
Although not common today, communications networks could adjust security postures based on changing ...
Many security services today only provides one security configuration at run-time, and cannot then u...
This paper discusses the modulation of security services in response to changes in network condition...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
Abstract — This paper analyzes three existing tunable security services based on a conceptual model....
In today’s society, serious organizations need protection against both internal and external attacks...
Quite often failures in network based services and server systems may not be accidental, but rather ...
The basic idea of QoS is to provide mechanisms that can offer different service levels, which are ex...
The new opportunities that come with the Internet as a worldwide network bring the new threats and r...
Historically the trustworthiness of a computer system was characterized by its reliability and avail...
Historically security has developed as a discipline, separate from the original dependability framew...
Recent research indicates that during the design of teleinformatic system the tradeoff between the s...
In a Quality of Service (QoS) aware communication system, a user is able to choose between various s...
It is understood that ICT security can be defined and enforced through rules. In this paper, the con...