skip to main content
research-article

Computer security with service degradations

Published:11 November 2013Publication History
Skip Abstract Section

Abstract

Computer systems invest substantial resources in securing their service. Costs of failure prevention are balanced against those of detection and recovery, even though recovery mechanisms can cause greater degradations of services. Most computer users consider degradations of service to be insidious and injurious. Yet, service degradations commonly assist in both the prevention and the curtailment of failures. Their toleration enables service continuation following fault activation, during which degradations are monitored for symptoms of security breaches.

References

  1. Levine, G.N. 2011. Fault tolerance with service degradations. Crosstalk: Journal of Defense Software Engineering, 31, 2 (March, April 2011), pp. 22--24.Google ScholarGoogle Scholar
  2. Levine, G.N. 2009. Defining defects, errors, and service degradations. ACM SIGSOFT, Software Engineering Notes, 34, 2 (March 2009), pp. 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Levine, G.N. 2003. Defining deadlock. Operating Systems Review, ACM Press, 37, 1 (Jan. 2003), pp. 54--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ISO/IEC. Information technology. 2000. Code of practice for information security management. ISO/IEC 17799: 2000(E), Geneva, Switzerland.Google ScholarGoogle Scholar
  5. Tippenhauer, N.O, Malisa, L., Ranganathan, A., and Capkun S. 2013. On limitations of friendly jamming for confidentiality. Proceedings of the IEEE Symposium on Security and Privacy (S&P), Zurich, Switzerland, (2013). pp 160--173. DOI = Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Colberg, C.S. 2002. Watermarking, tamper-proofing, and obfuscation -- tools for software protection, IEEE Transactions on Software Engineering, 28, 8 (Aug. 2002), pp. 735--746. DOI= http://www.cs.auckland.ac.nz/~cthombor/Pubs/01027797a.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lester, A. 2002. Principles of crime reduction through product design. Crime and Justice International, 18, 59 (February 2002), pp. 9--11.Google ScholarGoogle Scholar
  8. USC §1030 Fraud and related activity in connection with computers. Modification of 1994 Computer Fraud and Abuse Act. Cornell University Law School. DOI= http://www.law.cornell.edu/uscode/text/18/1030Google ScholarGoogle Scholar
  9. SANS Information Security Reading Room. DOI= http://www.sans.org/reading_room/whitepapers/legal/federal-computer-crime-laws_1446Google ScholarGoogle Scholar
  10. Avizienis, A., Laprie, J., Randell, B., and Landwehr, C. 2004. Basic concepts and taxonomy for dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, 1, 1 (Jan. - Mar. 2004), pp. 11--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kacprzyk, J., Zamojski, W., Mazurkiewicz,J., Sugier, J., and Walkowiak, T., ed. 2011. Dependable Computer Systems, Springer-Verlag (2011), p. 261.Google ScholarGoogle Scholar
  12. Schryver, J., Nutaro, J., and Haire, M. J. 2012. Metrics for availability analysis using a discrete event simulation method, Simulation Modelling Practice and Theory, 21 (2012) pp. 114--122.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Computer security with service degradations

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader