Exploitation of auctions for outsourcing security-critical projects.
Miltiadis KandiasAlexios MylonasMarianthi TheoharidouDimitris GritzalisPublished in: ISCC (2011)
Keyphrases
- information technology
- information security
- access control
- intrusion detection
- security issues
- security policies
- case study
- outsourced databases
- resource allocation
- information systems
- mechanism design
- security requirements
- software development
- business process
- statistical databases
- network security
- computer security
- project management
- security mechanisms
- information revelation
- multi attribute
- public sector
- security analysis
- trading agents
- private sector
- critical information
- reverse auction
- incomplete information