Requirements and specifications for adaptive security: Concepts and analysis
Author | Tun T.T. |
Author | Yang M. |
Author | Bandara A.K. |
Author | Yu Y. |
Author | Nhlabatsi A. |
Author | Khan N. |
Author | Khan K.M. |
Author | Nuseibeh B. |
Available date | 2019-09-30T07:48:38Z |
Publication Date | 2018 |
Publication Name | Proceedings - International Conference on Software Engineering |
Publication Name | ACM/IEEE 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2018, , co-located with International Conference on Software Engineering, ICSE 2018 |
Resource | Scopus |
ISBN | 9.78E+12 |
ISSN | 0270-5257 |
Abstract | In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is difficult because conditions of the environment are difficult to describe until the system has been deployed and used for a length of time. This paper defines the problem of adaptation in security-critical systems, and outlines the RELAIS approach for expressing requirements and specifying the behavior in a way that helps identify the need for adaptation, and the appropriate adaptation behavior at runtime. The paper introduces the notion of adaptation via input approximation and proposes statistical machine learning techniques for realizing it. The approach is illustrated with a running example and is applied to a realistic security example from a cloud-based file-sharing application. Bayesian classification and logistic regression methods are used to implement adaptive specifications and these methods offer different levels of adaptive security and usability in the file-sharing application. |
Sponsor | We thank the anonymous reviewers for insightful comments and suggestions, and Michael Jackson for guidance and encouragement. This work is supported by SFI grant 13/RC/2094, QNRF NPRP 5-079-1-018, and ERC Advanced Grant no. 291652 (ASAP). |
Language | en |
Publisher | IEEE Computer Society |
Subject | security requirements self-adaptation |
Type | Conference |
Pagination | 161-171 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2427 items ]