{"id":"https://openalex.org/W2946556517","doi":"https://doi.org/10.5220/0007761604880494","title":"A Framework for Measuring the Costs of Security at Runtime","display_name":"A Framework for Measuring the Costs of Security at Runtime","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2946556517","doi":"https://doi.org/10.5220/0007761604880494","mag":"2946556517"},"language":"en","primary_location":{"id":"doi:10.5220/0007761604880494","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007761604880494","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Cloud Computing and Services Science","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0007761604880494","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068337923","display_name":"Igor Ivki\u0107","orcid":"https://orcid.org/0000-0003-3037-7813"},"institutions":[{"id":"https://openalex.org/I4210094037","display_name":"University of Applied Sciences Burgenland","ror":"https://ror.org/00t6gnv18","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210094037"]},{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["AT","GB"],"is_corresponding":true,"raw_author_name":"Igor Ivkic","raw_affiliation_strings":["Lancaster University, Lancaster, U.K., University of Applied Sciences Burgenland, Eisenstadt and Austria, --- Select a Country ---","Lancaster University, Lancaster, UK"],"affiliations":[{"raw_affiliation_string":"Lancaster University, Lancaster, U.K., University of Applied Sciences Burgenland, Eisenstadt and Austria, --- Select a Country ---","institution_ids":["https://openalex.org/I4210094037","https://openalex.org/I67415387"]},{"raw_affiliation_string":"Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008386660","display_name":"Harald Pichler","orcid":"https://orcid.org/0000-0001-6043-2137"},"institutions":[{"id":"https://openalex.org/I4210094037","display_name":"University of Applied Sciences Burgenland","ror":"https://ror.org/00t6gnv18","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210094037"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Harald Pichler","raw_affiliation_strings":["University of Applied Sciences Burgenland, Eisenstadt and Austria, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences Burgenland, Eisenstadt and Austria, --- Select a Country ---","institution_ids":["https://openalex.org/I4210094037"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072746203","display_name":"Mario Zsilak","orcid":null},"institutions":[{"id":"https://openalex.org/I4210094037","display_name":"University of Applied Sciences Burgenland","ror":"https://ror.org/00t6gnv18","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210094037"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Mario Zsilak","raw_affiliation_strings":["University of Applied Sciences Burgenland, Eisenstadt and Austria, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences Burgenland, Eisenstadt and Austria, --- Select a Country ---","institution_ids":["https://openalex.org/I4210094037"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042425283","display_name":"Andreas Mauthe","orcid":"https://orcid.org/0000-0002-8727-9440"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Andreas Mauthe","raw_affiliation_strings":["Lancaster University, Lancaster and U.K., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Lancaster University, Lancaster and U.K., --- Select a Country ---","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068990236","display_name":"Markus Tauber","orcid":"https://orcid.org/0000-0002-0003-2243"},"institutions":[{"id":"https://openalex.org/I4210094037","display_name":"University of Applied Sciences Burgenland","ror":"https://ror.org/00t6gnv18","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210094037"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Markus Tauber","raw_affiliation_strings":["University of Applied Sciences Burgenland, Eisenstadt and Austria, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences Burgenland, Eisenstadt and Austria, --- Select a Country ---","institution_ids":["https://openalex.org/I4210094037"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068337923"],"corresponding_institution_ids":["https://openalex.org/I4210094037","https://openalex.org/I67415387"],"apc_list":null,"apc_paid":null,"fwci":0.4415,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70218366,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"488","last_page":"494"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10763","display_name":"Digital Transformation in Industry","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10763","display_name":"Digital Transformation in Industry","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9696000218391418,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.741239070892334},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.635556697845459},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5830686688423157},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5824131369590759},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48868587613105774},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4635780155658722},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4521685540676117},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.4475284218788147},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.43406277894973755},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.43165579438209534},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.35561010241508484},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.33491116762161255},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.2989150881767273},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.23698171973228455},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08517387509346008}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.741239070892334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.635556697845459},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5830686688423157},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5824131369590759},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48868587613105774},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4635780155658722},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4521685540676117},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.4475284218788147},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.43406277894973755},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.43165579438209534},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.35561010241508484},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.33491116762161255},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2989150881767273},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.23698171973228455},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08517387509346008},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.5220/0007761604880494","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007761604880494","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Cloud Computing and Services Science","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1905.11180","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1905.11180","pdf_url":"https://arxiv.org/pdf/1905.11180","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:eprints.lancs.ac.uk:134272","is_oa":false,"landing_page_url":"https://eprints.lancs.ac.uk/id/eprint/134272/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Contribution in Book/Report/Proceedings"}],"best_oa_location":{"id":"doi:10.5220/0007761604880494","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007761604880494","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Cloud Computing and Services Science","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.550000011920929,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W59059824","https://openalex.org/W115368157","https://openalex.org/W1918248053","https://openalex.org/W1935873743","https://openalex.org/W1964129414","https://openalex.org/W2089075252","https://openalex.org/W2232183966","https://openalex.org/W2253828178","https://openalex.org/W2275530856","https://openalex.org/W2295939521","https://openalex.org/W2478986546","https://openalex.org/W2553406992","https://openalex.org/W2589223011","https://openalex.org/W2809886866","https://openalex.org/W2810560784","https://openalex.org/W3100073269","https://openalex.org/W4242106125","https://openalex.org/W4402064934"],"related_works":["https://openalex.org/W2008985775","https://openalex.org/W2745157681","https://openalex.org/W8370799","https://openalex.org/W2165898552","https://openalex.org/W2030343105","https://openalex.org/W2907868081","https://openalex.org/W1528506334","https://openalex.org/W2290724697","https://openalex.org/W2299494954","https://openalex.org/W2055319964"],"abstract_inverted_index":{"In":[0,67,114],"Industry":[1],"4.0,":[2],"Cyber-Physical":[3],"Systems":[4],"(CPS)":[5],"are":[6,11,52],"formed":[7],"by":[8,133],"components,":[9],"which":[10,56],"interconnected":[12],"with":[13],"each":[14],"other":[15],"over":[16],"the":[17,29,40,108,124,143,148],"Internet":[18],"of":[19,25,36,111,127,147],"Things":[20],"(IoT).":[21],"The":[22],"resulting":[23,109,125],"capabilities":[24],"sensing":[26],"and":[27,61,64,96,100,150],"affecting":[28],"physical":[30],"world":[31],"offer":[32,57],"a":[33,135],"vast":[34],"range":[35],"opportunities,":[37],"yet,":[38],"at":[39,165],"same":[41],"time":[42],"pose":[43],"new":[44],"security":[45,71,88,129,163],"challenges.":[46],"To":[47],"address":[48],"these":[49,98],"challenges":[50],"there":[51],"various":[53],"IoT":[54],"Frameworks,":[55],"solutions":[58],"for":[59,72,106,122,130],"managing":[60],"controlling":[62],"IoT-components":[63,132],"their":[65],"interactions.":[66],"this":[68,115],"regard,":[69],"providing":[70,112,128],"an":[73,119,152],"interaction":[74],"usually":[75],"requires":[76],"performing":[77],"additional":[78],"security-related":[79],"tasks":[80],"(e.g.":[81],"authorisation,":[82],"encryption,":[83],"etc.)":[84],"to":[85,161],"prevent":[86],"possible":[87],"risks.":[89],"Research":[90],"currently":[91],"focuses":[92],"more":[93],"on":[94],"designing":[95],"developing":[97],"frameworks":[99],"does":[101],"not":[102],"satisfactorily":[103],"provide":[104,151],"methodologies":[105],"evaluating":[107],"costs":[110,126,164],"security.":[113],"paper":[116],"we":[117,141],"propose":[118],"initial":[120],"approach":[121],"measuring":[123],"interacting":[131],"using":[134],"Security":[136],"Cost":[137],"Modelling":[138],"Framework.":[139],"Furthermore,":[140],"describe":[142],"necessary":[144],"building":[145],"blocks":[146],"framework":[149],"experimental":[153],"design":[154],"showing":[155],"how":[156],"it":[157],"could":[158],"be":[159],"used":[160],"measure":[162],"runtime.":[166]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
