{"title":"自适应应用程序安全方法综述","authors":"Ahmed M. Elkhodary, J. Whittle","doi":"10.1109/SEAMS.2007.2","DOIUrl":null,"url":null,"abstract":"Adaptive systems dynamically change their behavior or structure at runtime to respond to environmental changes. This paper considers one class of adaptive systems - those that adapt application-level security mechanisms. Nowadays, adaptive software security is gaining greater attention as a way to balance the tradeoff between systems security and IT infrastructure overhead. Several adaptive security systems have been developed recently supporting hardware-level to application-level reconfiguration. This paper surveys four adaptive application-level security systems and evaluates them in terms of how well they support critical security services (i.e. authentication, authorization, and tolerance) and what level of adaptation they achieve. Based on our evaluation results, we provide recommendations for future research.","PeriodicalId":354701,"journal":{"name":"International Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS '07)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":"{\"title\":\"A Survey of Approaches to Adaptive Application Security\",\"authors\":\"Ahmed M. Elkhodary, J. Whittle\",\"doi\":\"10.1109/SEAMS.2007.2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Adaptive systems dynamically change their behavior or structure at runtime to respond to environmental changes. This paper considers one class of adaptive systems - those that adapt application-level security mechanisms. Nowadays, adaptive software security is gaining greater attention as a way to balance the tradeoff between systems security and IT infrastructure overhead. Several adaptive security systems have been developed recently supporting hardware-level to application-level reconfiguration. This paper surveys four adaptive application-level security systems and evaluates them in terms of how well they support critical security services (i.e. authentication, authorization, and tolerance) and what level of adaptation they achieve. Based on our evaluation results, we provide recommendations for future research.\",\"PeriodicalId\":354701,\"journal\":{\"name\":\"International Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS '07)\",\"volume\":\"83 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-05-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"50\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS '07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SEAMS.2007.2\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS '07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SEAMS.2007.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey of Approaches to Adaptive Application Security
Adaptive systems dynamically change their behavior or structure at runtime to respond to environmental changes. This paper considers one class of adaptive systems - those that adapt application-level security mechanisms. Nowadays, adaptive software security is gaining greater attention as a way to balance the tradeoff between systems security and IT infrastructure overhead. Several adaptive security systems have been developed recently supporting hardware-level to application-level reconfiguration. This paper surveys four adaptive application-level security systems and evaluates them in terms of how well they support critical security services (i.e. authentication, authorization, and tolerance) and what level of adaptation they achieve. Based on our evaluation results, we provide recommendations for future research.