Please use this identifier to cite or link to this item:
Title: Nonfunctional requirements validation - A game theoretic approach
Authors: Papadopoulou, Vicky 
Gregoriades, Andreas 
Major Field of Science: Social Sciences
Field Category: Computer and Information Sciences
Keywords: Future networks;Malicious software;Network designer;Network topology;Software systems;Security requirements
Issue Date: 2009
Source: Proceedings - International Conference on Management and Service Science, MASS 2009 2009, Article number 5304743 International Conference on Management and Service Science, MASS 2009; Wuhan; China; 20 September 2009 through 22 September 2009; Category numberCFP0941H; Code 78838
Conference: International Conference on Management and Service Science, MASS 2009 
Abstract: Network Security requirements have recently gained widespread attention in the requirements engineering community. Despite this, it is not yet clear how to systematically validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the software systems that depended on these networks. Security requirements specification prerequisite a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. To that end, this paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with a case study that demonstrates the application of the approach in a hypothetical network topology.
ISBN: 9781424446391
DOI: 10.1109/ICMSS.2009.5304743
Rights: ©2009 IEEE.
Type: Conference Papers
Affiliation : European University Cyprus 
Appears in Collections:Δημοσιεύσεις σε συνέδρια /Conference papers - poster -presentation

CORE Recommender
Show full item record


checked on Jan 19, 2021

Page view(s)

Last Week
Last month
checked on Jan 20, 2021

Google ScholarTM



Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.