Provisioning Network Security: Tradeoff between Information Access and Level of Security
نویسندگان
چکیده
It has been repeatedly pointed out that security problems in multi-agent systems are a manifestation of improper economic incentives provided for agents through mechanisms that are supposed to provide such incentives. This paper provides initial insight on how economics tools of utility theory and welfare economics may be used to analyze the behaviors of economic agents with respect to security choices. We consider a case where security can be produced in organization by using access to information systems as a production factor. There are important tradeoffs between access and security of information that leads to provisioning of additional amount of security being increasingly costly. We provide structural results that characterize these tradeoffs and demonstrate how different security preferences of agents may lead to suboptimal choice for the level of security. We further explore a game-theoretic formulation of the problem, modeling security provisioning in a two-player repeated game with side payments. Our results indicate importance of building long-term trust relationships in order to guarantee proper provisioning of security, as well as ability to find specific and payoff-independent values of payoff discounting factors that induce such trust-building and incentive-compatibility.
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملTop 4 Network Security Challenges in Healthcare
• .................................................................... Top 4 Network Security Challenges › Addressing Security Challenges with Network Access Control › An Evolving Network Environment. • .................................... Securing and Provisioning Medical Devices › Securing Network Access for Guests and Visitors › Securing Access to Patient Information › Achieving Complia...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004