International audienceDifferent security measures have emerged to encounter various Internet security threats, ensuring a certain level of protection against them. However, this does not come without a price. Indeed, there is a general agreement that high security measures involve high amount of resources, ultimately impacting the perceived Quality of Service (QoS). The objective of this paper is to define a framework, dubbed QoS2, that provides means to find a tradeoff between security requirements and their QoS counterparts. The QoS2 framework is based on the multiattribute decision-making theory. The performance of the QoS2 framework is evaluated through computer simulations. A use-case considering worm e-mail detection is used in the pe...
Enforcement of a high-level statement of security policy may be difficult to discern when mapped thr...
ABSTRACT: In this paper, we present quality of service (QoS) metrics for various network application...
The new opportunities that come with the Internet as a worldwide network bring the new threats and r...
International audienceDifferent security measures have emerged to encounter various Internet securit...
We examine the concept of security as a dimension of Quality of Service in distributed systems. Impl...
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A meth...
Although not common today, communications networks could adjust security postures based on changing ...
We argue that most forms of internet QoS must provide pro-tection against DoS attacks. To date, the ...
The emerging Service-Oriented Computing (SOC) paradigm promises to enable businesses and organizatio...
This project studies the various QoS mechanisms proposed by IETF. A comparative report highlighting ...
The number of web services made available on the Internet is progressively increasing, yielding more...
In a Quality of Service (QoS) aware communication system, a user is able to choose between various s...
Recent research indicates that during the design of teleinformatic system the tradeoff between the s...
This QoSS Costing Demo provides a GUI framework for modeling and managing task costs relating to se...
Current Quality of Service (QoS) models for service compositions are considering security either as ...
Enforcement of a high-level statement of security policy may be difficult to discern when mapped thr...
ABSTRACT: In this paper, we present quality of service (QoS) metrics for various network application...
The new opportunities that come with the Internet as a worldwide network bring the new threats and r...
International audienceDifferent security measures have emerged to encounter various Internet securit...
We examine the concept of security as a dimension of Quality of Service in distributed systems. Impl...
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A meth...
Although not common today, communications networks could adjust security postures based on changing ...
We argue that most forms of internet QoS must provide pro-tection against DoS attacks. To date, the ...
The emerging Service-Oriented Computing (SOC) paradigm promises to enable businesses and organizatio...
This project studies the various QoS mechanisms proposed by IETF. A comparative report highlighting ...
The number of web services made available on the Internet is progressively increasing, yielding more...
In a Quality of Service (QoS) aware communication system, a user is able to choose between various s...
Recent research indicates that during the design of teleinformatic system the tradeoff between the s...
This QoSS Costing Demo provides a GUI framework for modeling and managing task costs relating to se...
Current Quality of Service (QoS) models for service compositions are considering security either as ...
Enforcement of a high-level statement of security policy may be difficult to discern when mapped thr...
ABSTRACT: In this paper, we present quality of service (QoS) metrics for various network application...
The new opportunities that come with the Internet as a worldwide network bring the new threats and r...