Please use this identifier to cite or link to this item:
|Title:||Nonfunctional requirements validation - A game theoretic approach||Authors:||Papadopoulou, Vicky
|Major Field of Science:||Social Sciences||Field Category:||Computer and Information Sciences||Keywords:||Future networks;Malicious software;Network designer;Network topology;Software systems;Security requirements||Issue Date:||2009||Source:||Proceedings - International Conference on Management and Service Science, MASS 2009 2009, Article number 5304743 International Conference on Management and Service Science, MASS 2009; Wuhan; China; 20 September 2009 through 22 September 2009; Category numberCFP0941H; Code 78838||Conference:||International Conference on Management and Service Science, MASS 2009||Abstract:||Network Security requirements have recently gained widespread attention in the requirements engineering community. Despite this, it is not yet clear how to systematically validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the software systems that depended on these networks. Security requirements specification prerequisite a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. To that end, this paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with a case study that demonstrates the application of the approach in a hypothetical network topology.||URI:||https://ktisis.cut.ac.cy/handle/10488/14775||ISBN:||9781424446391||DOI:||10.1109/ICMSS.2009.5304743||Rights:||©2009 IEEE.||Type:||Conference Papers||Affiliation :||European University Cyprus|
|Appears in Collections:||Δημοσιεύσεις σε συνέδρια /Conference papers - poster -presentation|
checked on Jan 19, 2021
checked on Jan 20, 2021
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.