Self-healing and secure adaptive messaging middleware for business-critical systems

Habtamu Abie, Reijo Savola, John Bigham, Ilesh Dattani, Domenico Rotondi, Giorgio Da Bormida

    Research output: Contribution to journalArticleScientificpeer-review

    Abstract

    Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems achieve arbitrary resilience by a brute-force approach. Self-healing is either rudimentary or non-existent. In this study we present a self-healing and secure adaptive messaging middleware that provides solutions to overcome limitations in robustness, resilience, self-adaptability, scalability, and assurance against security threats and erroneous input during run-time in the face of changing threats. This developed system supports a messaging infrastructure which enables adaptive functions and assurance against security vulnerabilities and erroneous input vulnerabilities to improve the reliability, robustness and dependability of business-critical infrastructures. It provides autonomous adjustments of the run-time configuration of the system in order to preserve and maintain optimal and uninterrupted operation, improvement of the strength of security and degree of trust in the system, and improvement of the assessability and verifiability of the trustworthiness of the system. The methodology used in this research is partly analytical and partly experimental. We develop the new core functionalities theoretically and validate them practically by prototyping.
    Original languageEnglish
    Pages (from-to)34-51
    Number of pages18
    JournalInternational Journal on Advances in Security
    Volume3
    Issue number1-2
    Publication statusPublished - 2010
    MoE publication typeA1 Journal article-refereed

    Fingerprint

    Dive into the research topics of 'Self-healing and secure adaptive messaging middleware for business-critical systems'. Together they form a unique fingerprint.

    Cite this