2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W) 2019
DOI: 10.1109/fas-w.2019.00034
|View full text |Cite
|
Sign up to set email alerts
|

Security in Collective Adaptive Systems: A Roadmap

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 56 publications
0
3
0
Order By: Relevance
“…Pianini et al "look at security in the context of CASs [collective adaptive systems] by reasoning on how existing patterns and recommendations may apply under the assumptions and characteristics of such systems. " [19]. According to their taxonomy our work covers all of the four layers presented in the context of the "Defense in depth" principle: application, middleware, platform, and close-to-metal.…”
Section: Related Workmentioning
confidence: 99%
“…Pianini et al "look at security in the context of CASs [collective adaptive systems] by reasoning on how existing patterns and recommendations may apply under the assumptions and characteristics of such systems. " [19]. According to their taxonomy our work covers all of the four layers presented in the context of the "Defense in depth" principle: application, middleware, platform, and close-to-metal.…”
Section: Related Workmentioning
confidence: 99%
“…Little work is instead available on security, namely, detecting, isolating, and counteracting proactive malicious behaviour, such as hijacked robots. Some preliminary work has been proposed based on computational trust [16] at the application level or by delegating most of the security to the underlying platform [64]; however, further work is necessary to establish solid security practices [62]. This is especially true in case the robot system is deployed to perform collective surveillance [22].…”
Section: Safety and Securitymentioning
confidence: 99%
“…Security is related to privacy, but focuses on how to detect and counteract malicious intrusion. As with privacy, very little work currently specifically addresses CAS security [43], [44]; works found in literature do not generally tackle the issue at large, but typically propose designs inheriting security properties from the underlying platform [45], or investigate collective resilience to attacks in specific settings [46]. Fortunately, related fields such as autonomic computing have developed a body of literature that can be leveraged as a starting point for new, CAS-specific practices for both detection and response to attacks.…”
Section: Cass and Humansmentioning
confidence: 99%