Requirements and specifications for adaptive security: Concepts and analysis
المؤلف | Tun T.T. |
المؤلف | Yang M. |
المؤلف | Bandara A.K. |
المؤلف | Yu Y. |
المؤلف | Nhlabatsi A. |
المؤلف | Khan N. |
المؤلف | Khan K.M. |
المؤلف | Nuseibeh B. |
تاريخ الإتاحة | 2019-09-30T07:48:38Z |
تاريخ النشر | 2018 |
اسم المنشور | Proceedings - International Conference on Software Engineering |
اسم المنشور | ACM/IEEE 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2018, , co-located with International Conference on Software Engineering, ICSE 2018 |
المصدر | Scopus |
الترقيم الدولي الموحد للكتاب | 9.78E+12 |
الرقم المعياري الدولي للكتاب | 0270-5257 |
الملخص | In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is difficult because conditions of the environment are difficult to describe until the system has been deployed and used for a length of time. This paper defines the problem of adaptation in security-critical systems, and outlines the RELAIS approach for expressing requirements and specifying the behavior in a way that helps identify the need for adaptation, and the appropriate adaptation behavior at runtime. The paper introduces the notion of adaptation via input approximation and proposes statistical machine learning techniques for realizing it. The approach is illustrated with a running example and is applied to a realistic security example from a cloud-based file-sharing application. Bayesian classification and logistic regression methods are used to implement adaptive specifications and these methods offer different levels of adaptive security and usability in the file-sharing application. |
راعي المشروع | We thank the anonymous reviewers for insightful comments and suggestions, and Michael Jackson for guidance and encouragement. This work is supported by SFI grant 13/RC/2094, QNRF NPRP 5-079-1-018, and ERC Advanced Grant no. 291652 (ASAP). |
اللغة | en |
الناشر | IEEE Computer Society |
الموضوع | security requirements self-adaptation |
النوع | Conference |
الصفحات | 161-171 |
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2427 items ]