Proceedings ArticleDOI
Adaptive security and trust management for autonomic message-oriented middleware
Habtamu Abie
- pp 810-817
Reads0
Chats0
TLDR
An adaptive and evolving security (AES), and an adaptive trust management (ATM) approach to such autonomic messaging middleware systems, an approach that learns, anticipates, evolves and adapts to a changing environment at run-time in the face of changing threats.Abstract:Â
With the increase in society's dependence on IT communication systems, the need for dependable, trustable, robust and secure adaptive systems becomes ever more acute. Modern autonomic message-oriented middleware platforms have stringent requirements for self-healing, adapting, evolving, fault-tolerance, security and active vulnerability assessment, especially when the internal working model of a system and the environmental influences on the system are uncertain during run-time. In this paper we present an adaptive and evolving security (AES), and an adaptive trust management (ATM) approach to such autonomic messaging middleware systems, an approach that learns, anticipates, evolves and adapts to a changing environment at run-time in the face of changing threats. The methodology used in this research is partly analytical and partly experimental. This involves analysis of how the principles of AES and ATM can be applied to the environment resulting in the development of theoretical models which are then tested in practice by prototyping.read more
Citations
More filters
Proceedings ArticleDOI
Security in Internet of Things: Challenges, Solutions and Future Directions
TL;DR: This paper is presenting review of security attacks from the perspective of layers that comprises IoT, and a review of methods that provide solutions to these issues is presented along with their limitations.
Proceedings ArticleDOI
Risk-based adaptive security for smart IoT in eHealth
Habtamu Abie,Ilangko Balasingham +1 more
TL;DR: A risk-based adaptive security framework for IoTs in eHealth that will estimate and predict risk damages and future benefits using game theory and context-awareness techniques is described.
Journal ArticleDOI
A Systematic Survey of Self-Protecting Software Systems
TL;DR: By proposing and applying a comprehensive taxonomy to classify and characterize the state-of-the-art research in self-protecting software systems, this article has identified key patterns, trends and challenges in the existing approaches, which reveals a number of opportunities that will shape the focus of future research efforts.
Proceedings ArticleDOI
Architecture-based self-protecting software systems
TL;DR: This paper presents several architecture adaptation patterns that provide reusable detection and mitigation strategies against well-known web application security threats and describes the ongoing work in realizing these patterns on top of Rainbow, an existing architecture-based adaptation framework.
Proceedings ArticleDOI
Towards metrics-driven adaptive security management in e-health IoT applications
TL;DR: This work analyzes security objectives of E-health IoT applications and their adaptive security decision-making needs, and proposes a high-level adaptive security management mechanism based on security metrics to cope with the challenges.
References
More filters
Journal ArticleDOI
Security in an autonomic computing environment
TL;DR: This paper discusses the security and privacy challenges posed by autonomic systems and provides some recommendations for how these challenges may be met.
Proceedings ArticleDOI
Adaptive trust negotiation and access control
TL;DR: An Adaptive Trust Negotiation and Access Control (ATNAC) framework is introduced that combines two existing systems, TrustBuilder and GAA-API, to create a system with more flexibility and responsiveness to attack than either system currently provides.
A Taxonomy of Compositional Adaptation
TL;DR: This survey is intended to be a living document, updated periodically to summarize and classify new contributions to the field, and is maintained under the RAPIDware project web site, specifically, at www.cse.msu.edu/rapidware/survey.
Proceedings ArticleDOI
Dynamic authentication for high-performance networked applications
P.A. Schneck,K. Schwan +1 more
TL;DR: This research developed Authenticast, a dynamically configurable user-level communication protocol offering variable levels of security throughout the execution, which offers a novel security control abstraction with which tradeoffs in security vs. performance may be made explicit and then utilized with dynamic client-server asymmetries.
Proceedings ArticleDOI
A Survey of Approaches to Adaptive Application Security
Ahmed Elkhodary,Jon Whittle +1 more
TL;DR: This paper surveys four adaptive application-level security systems and evaluates them in terms of how well they support critical security services and what level of adaptation they achieve and provides recommendations for future research.