Abstract
Computer systems invest substantial resources in securing their service. Costs of failure prevention are balanced against those of detection and recovery, even though recovery mechanisms can cause greater degradations of services. Most computer users consider degradations of service to be insidious and injurious. Yet, service degradations commonly assist in both the prevention and the curtailment of failures. Their toleration enables service continuation following fault activation, during which degradations are monitored for symptoms of security breaches.
- Levine, G.N. 2011. Fault tolerance with service degradations. Crosstalk: Journal of Defense Software Engineering, 31, 2 (March, April 2011), pp. 22--24.Google Scholar
- Levine, G.N. 2009. Defining defects, errors, and service degradations. ACM SIGSOFT, Software Engineering Notes, 34, 2 (March 2009), pp. 1--14. Google ScholarDigital Library
- Levine, G.N. 2003. Defining deadlock. Operating Systems Review, ACM Press, 37, 1 (Jan. 2003), pp. 54--64. Google ScholarDigital Library
- ISO/IEC. Information technology. 2000. Code of practice for information security management. ISO/IEC 17799: 2000(E), Geneva, Switzerland.Google Scholar
- Tippenhauer, N.O, Malisa, L., Ranganathan, A., and Capkun S. 2013. On limitations of friendly jamming for confidentiality. Proceedings of the IEEE Symposium on Security and Privacy (S&P), Zurich, Switzerland, (2013). pp 160--173. DOI = Google ScholarDigital Library
- Colberg, C.S. 2002. Watermarking, tamper-proofing, and obfuscation -- tools for software protection, IEEE Transactions on Software Engineering, 28, 8 (Aug. 2002), pp. 735--746. DOI= http://www.cs.auckland.ac.nz/~cthombor/Pubs/01027797a.pdf Google ScholarDigital Library
- Lester, A. 2002. Principles of crime reduction through product design. Crime and Justice International, 18, 59 (February 2002), pp. 9--11.Google Scholar
- USC §1030 Fraud and related activity in connection with computers. Modification of 1994 Computer Fraud and Abuse Act. Cornell University Law School. DOI= http://www.law.cornell.edu/uscode/text/18/1030Google Scholar
- SANS Information Security Reading Room. DOI= http://www.sans.org/reading_room/whitepapers/legal/federal-computer-crime-laws_1446Google Scholar
- Avizienis, A., Laprie, J., Randell, B., and Landwehr, C. 2004. Basic concepts and taxonomy for dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, 1, 1 (Jan. - Mar. 2004), pp. 11--33. Google ScholarDigital Library
- Kacprzyk, J., Zamojski, W., Mazurkiewicz,J., Sugier, J., and Walkowiak, T., ed. 2011. Dependable Computer Systems, Springer-Verlag (2011), p. 261.Google Scholar
- Schryver, J., Nutaro, J., and Haire, M. J. 2012. Metrics for availability analysis using a discrete event simulation method, Simulation Modelling Practice and Theory, 21 (2012) pp. 114--122.Google ScholarCross Ref
Index Terms
- Computer security with service degradations
Recommendations
Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT
Network and System SecurityAbstractWith a large number of connected Internet of Things (IoT) devices deployed across the world, they have become popular targets of malicious attacks raising great security challenges. Many manufacturers are making great efforts to keep the software ...
A Strategic Approach to IoT Security by Working Towards a Secure IoT Future
The internet of things' (IoT) fast-growing development and adoption are undeniable. Although the IoT development is moving at a fast rate, the security of these technologies is not keeping up. Lack of security infrastructure on the internet of things ...
Investigation of security issues for service-oriented network architecture
The current Internet is facing unprecedented demands, and the challenges and protocols were designed and incorporated into the system as a patchwork for solving many issues. The patchwork approach of non-integrated security mechanisms does not ...
Comments