Systems Modeling: Methodologies and Tools by Antonio Puliafito & Kishor S. Trivedi
Author:Antonio Puliafito & Kishor S. Trivedi
Language: eng
Format: epub
ISBN: 9783319923789
Publisher: Springer International Publishing
11.3.1 Overview
Network security requirements are substantially different from conventional embedding constraints such as bandwidth or CPU time. They typically do not refer to a consumable resource, but rather to a specific set of features that need to be available. For example, a customer might require one of his virtual nodes to be executed in a particularly safe environment, requiring specific protection from the underlying substrate node.
An abstract approach to this problem is to define security levels for substrate and virtual nodes, requiring the embedding algorithm to match these levels appropriately (cf. [9, 13, 14]). However, in practice the concept of strictly hierarchical levels proves to be too abstract. In an environment with multiple involved parties (as it is common in cloud computing), it is difficult to find a comprehensive definition of levels that can satisfy each party.
Instead, it is more likely that customers specify a particular set of security requirements, for example protection by intrusion detection software or by a firewall. A cloud provider, on the other hand, can label its equipment such that the customer’s requests can be mapped appropriately. A motivational example is given next, to demonstrate the use case of such a scenario.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25284)
Hello! Python by Anthony Briggs(24338)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23431)
Kotlin in Action by Dmitry Jemerov(22510)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21972)
Dependency Injection in .NET by Mark Seemann(21842)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20709)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19522)
Grails in Action by Glen Smith Peter Ledbrook(18605)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17032)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13690)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11853)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9198)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8360)