{"title":"基于mape的运行时安全方法","authors":"Mohamed Amoud, O. Roudiès","doi":"10.1109/SWSTE.2016.28","DOIUrl":null,"url":null,"abstract":"Dynamic systems cause challenges for security because it is impossible to anticipate all the possible changes at design-time. Adaptive security is an applicable solution for this challenge. It is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. In this paper we describe an approach detailing key steps and activities to create an adaptive security solution. The architecture conforms to the MAPE-K reference model, which is a widely applied reference model in autonomic computing. Steps include: Establishing a control point to force control of the security decision process from the existing system. Identifying an environment parameter with which the security will trade off. Studying the interrelationship between security and the environment parameter in the existing system context by identifying measurable factors which influence their relationship. Formulation of a trade-off goal which is optimised based on multiple objectives, one of which is a security objective. Consequently, the proposed approach is capable of deploying mechanisms adaptive security to satisfy different security needs at different conditions.","PeriodicalId":118525,"journal":{"name":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"MaPE-K-Based Approach for Security @ Runtime\",\"authors\":\"Mohamed Amoud, O. Roudiès\",\"doi\":\"10.1109/SWSTE.2016.28\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Dynamic systems cause challenges for security because it is impossible to anticipate all the possible changes at design-time. Adaptive security is an applicable solution for this challenge. It is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. In this paper we describe an approach detailing key steps and activities to create an adaptive security solution. The architecture conforms to the MAPE-K reference model, which is a widely applied reference model in autonomic computing. Steps include: Establishing a control point to force control of the security decision process from the existing system. Identifying an environment parameter with which the security will trade off. Studying the interrelationship between security and the environment parameter in the existing system context by identifying measurable factors which influence their relationship. Formulation of a trade-off goal which is optimised based on multiple objectives, one of which is a security objective. Consequently, the proposed approach is capable of deploying mechanisms adaptive security to satisfy different security needs at different conditions.\",\"PeriodicalId\":118525,\"journal\":{\"name\":\"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SWSTE.2016.28\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SWSTE.2016.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic systems cause challenges for security because it is impossible to anticipate all the possible changes at design-time. Adaptive security is an applicable solution for this challenge. It is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. In this paper we describe an approach detailing key steps and activities to create an adaptive security solution. The architecture conforms to the MAPE-K reference model, which is a widely applied reference model in autonomic computing. Steps include: Establishing a control point to force control of the security decision process from the existing system. Identifying an environment parameter with which the security will trade off. Studying the interrelationship between security and the environment parameter in the existing system context by identifying measurable factors which influence their relationship. Formulation of a trade-off goal which is optimised based on multiple objectives, one of which is a security objective. Consequently, the proposed approach is capable of deploying mechanisms adaptive security to satisfy different security needs at different conditions.