University of Limerick Institutional Repository

Topology aware adaptive security

DSpace Repository

Show simple item record Pasquale, Liliana Ghezzi, Carlo Menghi, Claudio Tsigkanos, Christos Nuseibeh, Bashar 2014-09-10T08:20:48Z 2014-09-10T08:20:48Z 2014
dc.description peer-reviewed en_US
dc.description.abstract Adaptive security systems aim to protect valuable assets in the face of changes in their operational environment. They do so by monitoring and analysing this environment, and deploying security functions that satisfy some protection (security, privacy, or forensic) requirements. In this paper, we suggest that a key characteristic for engineering adaptive security is the topology of the operational environment, which represents a physical and/or a digital space - including its structural relationships, such as containment, proximity, and reachability. For adaptive security, topology expresses a rich representation of context that can provide a system with both structural and semantic awareness of important contextual characteristics. These include the location of assets being protected or the proximity of potentially threatening agents that might harm them. Security-related actions, such as the physical movement of an actor from a room to another in a building, may be viewed as topological changes. The detection of a possible undesired topological change (such as an actor possessing a safe’s key entering the room where the safe is located) may lead to the decision to deploy a particular security control to protect the relevant asset. This position paper advocates topology awareness for more effective engineering of adaptive security. By monitoring changes in topology at runtime one can identify new or changing threats and attacks, and deploy adequate security controls accordingly. The paper elaborates on the notion of topology and provides a vision and research agenda on its role for systematically engineering adaptive security systems. en_US
dc.language.iso eng en_US
dc.publisher Association for Computing Machinery en_US
dc.relation.ispartofseries SEAMS 2014 Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems;pp. 43-48
dc.rights "© ACM, 2014. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in SEAMS 2014 Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems . pp. 43-48, en_US
dc.subject topology en_US
dc.subject adaptation en_US
dc.subject security
dc.subject privacy
dc.subject digital forensics
dc.title Topology aware adaptive security en_US
dc.type info:eu-repo/semantics/conferenceObject en_US
dc.type.supercollection all_ul_research en_US
dc.type.supercollection ul_published_reviewed en_US
dc.identifier.doi 10.1145/2593929.2593939
dc.contributor.sponsor SFI en_US
dc.contributor.sponsor ERC en_US
dc.relation.projectid 10/CE/I1855 en_US
dc.relation.projectid (ASAP) 291652 en_US
dc.relation.projectid SNScom 227977 en_US
dc.rights.accessrights info:eu-repo/semantics/openAccess en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ULIR


My Account