University of Limerick Institutional Repository

Requirements and specifications for adaptive security: concepts and analysis

DSpace Repository

Show simple item record

dc.contributor.author Tun, Thein Than
dc.contributor.author Yang, Mu
dc.contributor.author Bandara, Arosha K.
dc.contributor.author Yu, Y.
dc.contributor.author Nhlabatsi, A.
dc.contributor.author Khan, N.
dc.contributor.author Khan, K.M.
dc.contributor.author Bashara, Bashar
dc.date.accessioned 2018-07-26T11:33:20Z
dc.date.available 2018-07-26T11:33:20Z
dc.date.issued 2018
dc.identifier.uri http://hdl.handle.net/10344/6993
dc.description peer-reviewed en_US
dc.description.abstract In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are diicult to describe until the system has been deployed and used for a length of time. This paper deines the problem of adaptation in security-critical systems, and outlines the RELAIS approach for expressing requirements and specifying the behavior in a way that helps identify the need for adaptation, and the appropriate adaptation behavior at runtime. The paper introduces the notion of adaptation via input approximation and proposes statistical machine learning techniques for realizing it. The approach is illustrated with a running example and is applied to a realistic security example from a cloud-based ile-sharing application. Bayesian classiication and logistic regression methods are used to implement adaptive speciications and these methods ofer diferent levels of adaptive security and usability in the ile-sharing application. en_US
dc.language.iso eng en_US
dc.publisher Association for Computing Machinery en_US
dc.relation.ispartofseries SEAMS '18 Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems;pp. 161-171
dc.relation.uri http://dx.doi.org/10.1145/3194133.3194155
dc.rights "© ACM, 2018. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in SEAMS '18 Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, pp. 161-171, http://dx.doi.org/10.1145/3194133.3194155 en_US
dc.subject sequrity requirements en_US
dc.subject self-adaptation en_US
dc.title Requirements and specifications for adaptive security: concepts and analysis en_US
dc.type info:eu-repo/semantics/conferenceObject en_US
dc.type.supercollection all_ul_research en_US
dc.type.supercollection ul_published_reviewed en_US
dc.identifier.doi 10.1145/3194133.3194155
dc.contributor.sponsor SFI en_US
dc.contributor.sponsor ERC en_US
dc.relation.projectid 13/RC/2094 en_US
dc.relation.projectid QNRF NPRP 5-079-1-018 en_US
dc.relation.projectid 291652 en_US
dc.rights.accessrights info:eu-repo/semantics/openAccess en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ULIR


Browse

My Account

Statistics