Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems 2014
DOI: 10.1145/2593929.2593938
|View full text |Cite
|
Sign up to set email alerts
|

Requirements-driven mediation for collaborative security

Abstract: Security is concerned with the protection of assets from intentional harm. Secure systems provide capabilities that enable such protection to satisfy some security requirements. In a world increasingly populated with mobile and ubiquitous computing technology, the scope and boundary of security systems can be uncertain and can change. A single functional component, or even multiple components individually, are often insufficient to satisfy complex security requirements on their own.Adaptive security aims to en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…The algorithm for mediator synthesis (Algorithm 1) starts by checking the basic configuration where G s is satisfied in the initial states (Lines 1-5). The algorithm then systematically explores the state space of the composition of the projected capabilities (C i for simplicity) to synthesise a mediator (Lines [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. This exploration is guided by the selection of a capability whose initial state s 0 k will be further examined (Line 7).…”
Section: Supporting Collaborative Security In the Internet Of Things mentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm for mediator synthesis (Algorithm 1) starts by checking the basic configuration where G s is satisfied in the initial states (Lines 1-5). The algorithm then systematically explores the state space of the composition of the projected capabilities (C i for simplicity) to synthesise a mediator (Lines [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. This exploration is guided by the selection of a capability whose initial state s 0 k will be further examined (Line 7).…”
Section: Supporting Collaborative Security In the Internet Of Things mentioning
confidence: 99%
“…In the context of cyber-physical systems, we particularly focus on physical security, that is the protection of material assets from physical attacks (e.g., theft) [52]. In a previous position paper [6], we propose collaborative security whereby both the selection and implementation of countermeasures are performed at runtime. In this paper, we propose and elaborate a framework for collaborative security that composes the capabilities of multiple, potentially heterogeneous, devices with variable (configurable) behaviours, in order to satisfy their requirements.…”
Section: Introductionmentioning
confidence: 99%
“…Related to this work in self-adaptive software systems, Bennaceur et al [9] propose a vision to support collaborative security by mediating emerging components in an environment such that the constraints of individual components may be complemented or compensated by another to achieve opportunistic benefit such as availability and resilience. This work adds to the vision that social collaboration could happen among people when their constraints can be formally modeled and reasoned about.…”
Section: Related Workmentioning
confidence: 99%
“…Salehie et al [46] propose an approach in which a runtime model that combines goals, threats, and assets models is used to evaluate the cost and benefit of applying each security control (i.e., the mechanism that needs to be deployed in order to protect assets from harm) and choosing the most appropriate one. Collaborative security [2] uses mediation to implement the appropriate security controls by composing components' capabilities at runtime.…”
Section: E M Rmentioning
confidence: 99%