Ontology-based security adaptation at run-time

Antti Evesti, Eila Ovaska

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

15 Citations (Scopus)

Abstract

This paper describes how software is able to autonomously adapt its security mechanisms based on knowledge from security ontology. Security adaptation is required because a software’s environment changes during run-time. Thus, all security requirements cannot be defined beforehand. To achieve security adaptation, we have combined a security ontology that defines security mechanisms, security objectives, and high level security measurements. The run-time security adaptation utilises this security ontology to adapt security mechanisms or their parameters to fulfil security requirements for each environment and usage situation. The novelty of this approach comes from the utilisation of ontologies and security measurements, which makes adaptation flexible. We validate our security adaptation with a case study in a smart space environment. The case study proves that security adaptation is able to work autonomously without other user actions.
Original languageEnglish
Title of host publicationProceedings
Subtitle of host publicationFourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2010
PublisherIEEE Institute of Electrical and Electronic Engineers
Pages204-212
ISBN (Print)978-0-7695-4232-4, 978-1-4244-8537-6
DOIs
Publication statusPublished - 2010
MoE publication typeA4 Article in a conference publication
EventFourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2010 - Budapest, Hungary
Duration: 27 Sept 20101 Oct 2010

Conference

ConferenceFourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2010
Abbreviated titleSASO 2010
Country/TerritoryHungary
CityBudapest
Period27/09/101/10/10

Keywords

  • Security ontology
  • dynamic adaptation
  • quality management

Fingerprint

Dive into the research topics of 'Ontology-based security adaptation at run-time'. Together they form a unique fingerprint.

Cite this