Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/14775
DC FieldValueLanguage
dc.contributor.authorPapadopoulou, Vicky-
dc.contributor.authorGregoriades, Andreas-
dc.date.accessioned2019-08-01T09:13:10Z-
dc.date.available2019-08-01T09:13:10Z-
dc.date.issued2009-
dc.identifier.citationProceedings - International Conference on Management and Service Science, MASS 2009 2009, Article number 5304743 International Conference on Management and Service Science, MASS 2009; Wuhan; China; 20 September 2009 through 22 September 2009; Category numberCFP0941H; Code 78838en_US
dc.identifier.isbn9781424446391-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/14775-
dc.description.abstractNetwork Security requirements have recently gained widespread attention in the requirements engineering community. Despite this, it is not yet clear how to systematically validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the software systems that depended on these networks. Security requirements specification prerequisite a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. To that end, this paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with a case study that demonstrates the application of the approach in a hypothetical network topology.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.rights©2009 IEEE.en_US
dc.subjectFuture networksen_US
dc.subjectMalicious softwareen_US
dc.subjectNetwork designeren_US
dc.subjectNetwork topologyen_US
dc.subjectSoftware systemsen_US
dc.subjectSecurity requirementsen_US
dc.titleNonfunctional requirements validation - A game theoretic approachen_US
dc.typeConference Papersen_US
dc.collaborationEuropean University Cyprusen_US
dc.subject.categoryComputer and Information Sciencesen_US
dc.countryCyprusen_US
dc.subject.fieldSocial Sciencesen_US
dc.publicationPeer Revieweden_US
dc.relation.conferenceInternational Conference on Management and Service Science, MASS 2009en_US
dc.identifier.doi10.1109/ICMSS.2009.5304743en_US
dc.identifier.scopus2-s2.0-73849093631-
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/73849093631-
cut.common.academicyear2009-2010en_US
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_c94f-
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.openairetypeconferenceObject-
item.cerifentitytypePublications-
crisitem.author.deptDepartment of Management, Entrepreneurship and Digital Business-
crisitem.author.facultyFaculty of Tourism Management, Hospitality and Entrepreneurship-
crisitem.author.orcid0000-0002-7422-1514-
crisitem.author.parentorgFaculty of Tourism Management, Hospitality and Entrepreneurship-
Appears in Collections:Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation
CORE Recommender
Show simple item record

SCOPUSTM   
Citations 50

2
checked on Mar 14, 2024

Page view(s) 50

257
Last Week
3
Last month
8
checked on Jul 26, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.