Design of service-based systems with adaptive tradeoff between security and service delay

Sik-Sang Yau, Min Yan, Dazhi Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Service-based Systems (SBS) have the advantage of composing distributed systems from various services provided by multiple providers transparently. In addition to functional correctness, multiple non-functional QoS requirements should also be satisfied in such systems. Among these QoS requirements, security protection and real-time performance are the two major concerns. However, neither application users, nor service providers, have adequate control over such QoS of SBS. In this paper, an approach to the design of SBS with the capability of tradeoff between security and service delay of composite services running across various service hosts is presented in order to satisfy both security and real-time performance requirements simultaneously.

Original languageEnglish (US)
Title of host publicationAutonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings
PublisherSpringer Verlag
Pages103-113
Number of pages11
ISBN (Print)9783540735465
DOIs
StatePublished - 2007
Event4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007 - Hong Kong, China
Duration: Jul 11 2007Jul 13 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4610 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007
Country/TerritoryChina
CityHong Kong
Period7/11/077/13/11

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Design of service-based systems with adaptive tradeoff between security and service delay'. Together they form a unique fingerprint.

Cite this