2015
DOI: 10.1002/cpe.3583
|View full text |Cite
|
Sign up to set email alerts
|

Trust‐based security‐level evaluation method for dynamic service‐oriented environments

Abstract: SUMMARYA method of decision-making in security-level estimation process of service-based applications in future Internet architecture is proposed. We demonstrate how distributed services can be composed to form an application run within the next-generation network infrastructure and their security level may be assessed. Our approach is illustrated by the experiments carried on exemplary application (virtual laboratory online lab, using future Internet IPv6 QoS architecture), in which our method was evaluated a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 40 publications
(55 reference statements)
0
2
0
Order By: Relevance
“…Our study highlights the importance of the measurement of spatial autocorrelation for the security level evaluation of the composite services in service-oriented systems. More generally, the spatial autocorrelation empowers the system to fraud detection by implementation of the business process logic (Kołaczek et al, 2015).…”
Section: Security Analysis At Business Processes Levelmentioning
confidence: 99%
“…Our study highlights the importance of the measurement of spatial autocorrelation for the security level evaluation of the composite services in service-oriented systems. More generally, the spatial autocorrelation empowers the system to fraud detection by implementation of the business process logic (Kołaczek et al, 2015).…”
Section: Security Analysis At Business Processes Levelmentioning
confidence: 99%
“…The principles of service orientation are independent of any vendor, product, or technology. Kołaczek et al proposed a method of decision-making in security level estimation process of service-based applications in Future Internet architecture [11]. Using experiments that carried on exemplary application (virtual laboratory Online Lab, using Future Internet IPv6 QoS architecture), the paper evaluates against two types of attacks observed with the use of traffic anomaly detection methods.…”
mentioning
confidence: 99%