Konferans bildirisi Açık Erişim

Security Solution Suitability Analysis using Modified Multiplicative Analytic Hierarchy Process

Faigl, Zoltan; Lindskog, Stefan; Brunstrom, Anna


MARC21 XML

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Lindskog, Stefan</subfield>
    <subfield code="u">Karlstad Univ, Dept Comp Sci, Karlstad, Sweden</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Brunstrom, Anna</subfield>
    <subfield code="u">Karlstad Univ, Dept Comp Sci, Karlstad, Sweden</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-tubitak-destekli-proje-yayinlari</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="a">Creative Commons Attribution</subfield>
    <subfield code="u">http://www.opendefinition.org/licenses/cc-by</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.81043/aperta.26952</subfield>
    <subfield code="n">doi</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.81043/aperta.26953</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Security Solution Suitability Analysis using Modified Multiplicative Analytic Hierarchy Process</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">Faigl, Zoltan</subfield>
    <subfield code="u">BME, Mobile Innovat Ctr, Budapest, Hungary</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="o">oai:zenodo.org:26953</subfield>
    <subfield code="p">user-tubitak-destekli-proje-yayinlari</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="2">opendefinition.org</subfield>
    <subfield code="a">cc-by</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2010-01-01</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="u">https://aperta.ulakbim.gov.trrecord/26953/files/bib-911d90de-727e-474e-9d22-e183373902d4.txt</subfield>
    <subfield code="z">md5:e4af32a6ca27e2617dd99f8da3cf460b</subfield>
    <subfield code="s">173</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <controlfield tag="005">20210315121512.0</controlfield>
  <controlfield tag="001">26953</controlfield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">conferencepaper</subfield>
  </datafield>
  <datafield tag="711" ind1=" " ind2=" ">
    <subfield code="a">2010 IEEE GLOBECOM WORKSHOPS</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">Tackling security and performance issues in ubiquitous computing has turned out to be a challenging task due to the heterogeneity of both the environment and the applications. Services must satisfy several constraints caused by the security, performance, and other requirements of applications, users and providers. This paper introduces a new formalized decision model for security solution suitability analysis. It supports the design of dynamic security services and can be used by security managers making runtime decisions. Our solution improves previously proposed AHP-based decision models. The MAHP decision engine is applied using a new approach. Furthermore, we extend the MAHP algorithm to handle the non-fulfillment of requirements. This results in more accurate decisions, and better fulfillment of the design criteria. The use of the proposed decision model is illustrated through an IKEv2 authentication method selection problem.</subfield>
  </datafield>
</record>
38
6
görüntülenme
indirilme
Görüntülenme 38
İndirme 6
Veri hacmi 1.0 kB
Tekil görüntülenme 36
Tekil indirme 6

Alıntı yap