Dynamic Adaptation and Reconfiguration of Security in Mobile Devices

被引:0
作者
Amoud, Mohamed [1 ]
Roudies, Ounsa [1 ]
机构
[1] Mohammed V Univ, SIWeb Team, EMI, Rabat, Morocco
来源
2017 INTERNATIONAL CONFERENCE ON CYBER INCIDENT RESPONSE, COORDINATION, CONTAINMENT & CONTROL (CYBER INCIDENT) | 2017年
关键词
Adaptive Security; Autonomic Computing; MAPE-K; Dynamic Software Product Lines; Mobile Devices;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Devices offer enriched services and information for the end users. Achieving security in such a dynamic and heterogeneous environment is a challenging task. Hence, adaptive security is an applicable solution for this challenge. It is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. In this paper, we propose a self-adaptive security solution for Mobile Devices (Smartphone, Tablets, ...) based on the combination of the MAPE-K reference model to dynamic negotiate and deploy of security policies, and DSPL approach to reconfigure the security level of the applications at runtime and monitor the changes in the context. The novelty of our approach comes from dynamic negotiation of security policies and automatic reconfiguration of security level to instantiate the new security policies at runtime in order to be capable of deploying adaptive security mechanisms to satisfy different security needs at different conditions.
引用
收藏
页数:6
相关论文
共 20 条
[1]  
Abelarde Jesus, 2016, SECURITY SYSTEMS ENG
[2]  
Adler R., 2007, WORKSH MOD DRIV SOFT, P9
[3]   MAPE-K-Based Approach for Security @ Runtime [J].
Amoud, Mohamed ;
Roudies, Ounsa .
2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SCIENCE, TECHNOLOGY AND ENGINEERING (SWSTE 2016), 2016, :138-140
[4]  
Capilla R., 2014, J SYST STWARE
[5]  
Cheng S., 2015, P 11 INT C INF SEC P
[6]  
Elkhodary Ahmed, 2007, 2007 International Workshop on Software Engineering for Adaptive and Self-Managing Systems, DOI 10.1109/SEAMS.2007.2
[7]  
Elrakaiby Yehia, 2014, Engineering Secure Software and Systems. 6th International Symposium, ESSoS 2014. Proceedings: LNCS 8364, P19, DOI 10.1007/978-3-319-04897-0_2
[8]  
Evesti A., 2013, ISRN ARTIFICIAL INTE, P1
[9]  
Evesti A., 2014, THESIS
[10]  
Gomaa H., 2011, 5 INT WORKSH DYN SOF, P35