Proceedings of the 23rd International Conference on Enterprise Information Systems 2021
DOI: 10.5220/0010448603130320
|View full text |Cite
|
Sign up to set email alerts
|

A Self-protecting Approach for Service-oriented Mobile Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(8 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…3: Similar to the previous component, we can use other types of solutions that enable communication between services [45]; and (iii) Self-protecting module (see Fig. 3: we also cite in the description of this module that we used a previous work of our research group [13] based on selfprotecting. In this sense, we can use similar or complementary solutions in this module to provide protection at runtime.…”
Section: N Table Graphical Interfacementioning
confidence: 99%
See 2 more Smart Citations
“…3: Similar to the previous component, we can use other types of solutions that enable communication between services [45]; and (iii) Self-protecting module (see Fig. 3: we also cite in the description of this module that we used a previous work of our research group [13] based on selfprotecting. In this sense, we can use similar or complementary solutions in this module to provide protection at runtime.…”
Section: N Table Graphical Interfacementioning
confidence: 99%
“…This layer also contains two important mechanisms for any type of CPS, which are self-protecting and observability. The self-protecting mechanism acts as a protecting strategy for Self-CPS [13]. The observability mechanism aims to present to its stakeholders the current state of the system (Self-CPS) through a set of metrics, tracking information, and logs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This involves both the security of the managing and the managed system in addition to their interactions. While the security of a managed system has been studied in multiple domains [1,67,89,122,166,171,178,278], to the best of our knowledge, there has been no research that analyzes the security of the managing system or the adaptation mechanisms associated with the adaptation process. Security analysis of the adaptation process is critical, since self-adaptive systems are additionally vulnerable to classes of attacks that exploit the adapting or evolving nature of a system.…”
Section: Discussionmentioning
confidence: 99%
“…The measurement layer employs security metrics to derive key risk indicators which are used to decide whether a security control needs to be deployed to the system (the adaptation layer) via a rule-based engine that evaluates security policies (the decision making layer). Martins et al [178] propose a self-protecting approach for service-oriented mobile applications. They employ machine learning techniques to detect and classify threats and vulnerabilities and recommend mitigations.…”
Section: Self-protecting Systemsmentioning
confidence: 99%