Show simple item record

AuthorTun T.T.
AuthorYang M.
AuthorBandara A.K.
AuthorYu Y.
AuthorNhlabatsi A.
AuthorKhan N.
AuthorKhan K.M.
AuthorNuseibeh B.
Available date2019-09-30T07:48:38Z
Publication Date2018
Publication NameProceedings - International Conference on Software Engineering
Publication NameACM/IEEE 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2018, , co-located with International Conference on Software Engineering, ICSE 2018
ResourceScopus
ISBN9.78E+12
ISSN0270-5257
URIhttp://dx.doi.org/10.1145/3194133.3194155
URIhttp://hdl.handle.net/10576/11989
AbstractIn an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is difficult because conditions of the environment are difficult to describe until the system has been deployed and used for a length of time. This paper defines the problem of adaptation in security-critical systems, and outlines the RELAIS approach for expressing requirements and specifying the behavior in a way that helps identify the need for adaptation, and the appropriate adaptation behavior at runtime. The paper introduces the notion of adaptation via input approximation and proposes statistical machine learning techniques for realizing it. The approach is illustrated with a running example and is applied to a realistic security example from a cloud-based file-sharing application. Bayesian classification and logistic regression methods are used to implement adaptive specifications and these methods offer different levels of adaptive security and usability in the file-sharing application.
SponsorWe thank the anonymous reviewers for insightful comments and suggestions, and Michael Jackson for guidance and encouragement. This work is supported by SFI grant 13/RC/2094, QNRF NPRP 5-079-1-018, and ERC Advanced Grant no. 291652 (ASAP).
Languageen
PublisherIEEE Computer Society
Subjectsecurity requirements
self-adaptation
TitleRequirements and specifications for adaptive security: Concepts and analysis
TypeConference Paper
Pagination161-171


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record