Abstract
In this paper we describe a framework that supports the dynamic configuration, adaptation and monitoring of systems that need to guarantee specific security and dependability (S&D) properties whilst operating in distributed settings. The framework is based on patterns providing abstract specifications of implementation solutions that can be used by systems in order to achieve specific S&D properties. The focus herein will be on the monitoring aspects of the framework which allow it to adapt to violations of the S&D requirements and changes to the current context.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Maña, A., et al.: Security engineering for ambient intelligence: A manifesto. In: Integrating Security and Software Engineering: Advances and Future Vision, pp. 244–270. Idea Group Publishing (2006)
Sanchez-Cid, F., et al.: Software engineering techniques applied to AmI: Security patterns. In: Developing Ambient Intelligence: Proc. of the First Int. Conf. on Ambient Intelligence Developments (AmID 2006), Sophia-Antipolis, France, Springer, Heidelberg (2006)
Campadello, S., et al.: S&D requirements specification. Deliverable A7.D2.1, SERENITY Project (2006), Available from http://www.serenity-forum.org
Maña, A., et al.: Patterns and integration schemes languages. Deliverable A5.D2.1, SERENITY Project (2006), Available from http://www.serenity-forum.org
Shanahan, M.P.: The event calculus explained. In: Veloso, M.M., Wooldridge, M.J. (eds.) Artificial Intelligence Today. LNCS (LNAI), vol. 1600, pp. 409–430. Springer, Heidelberg (1999)
Melton, R., Garlan, D.: Architectural Unification. In: Proceedings of CASCON 1997, Ontario, Canada (1997)
Spanoudakis, G., Mahbub, K.: Non intrusive monitoring of service based systems. International Journal of Cooperative Information Systems 15, 325–358 (2006)
Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Dept. of Computer Engineering, Chalmers Univ. (2000)
Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 7, 1289–1296 (2000)
Anagnostakis, K., et al.: Detecting targeted attacks using shadow honeypots. In: Proc. of the 14t h USENIX Security Symposium (2005)
Labbe, K., et al.: A methodology for evaluation of host-based intrusion prevention systems and its application. In: Proc. of the 7th IEEE Work. on Information Assurance (2006)
Corradi, A., et al.: Context-based access control management in ubiquitous environments. In: Third IEEE Int. Symp. on Network Computing and Applications, pp. 253–260. IEEE Computer Society Press, Los Alamitos (2004)
Hulsebosch, J., et al.: Context sensitive access control. In: Proc. of the Tenth ACM Symp. on Access Control Models and Technologies, SACMAT 2005, pp. 111–119. ACM Press, New York (2005)
Robinson, W.: Monitoring software requirements using instrumented code. In: Proc. of the Hawaii Int. Conf. on Systems Sciences, 2002, Hawaii, USA (2002)
Feather, M., et al.: Reconciling system requirements and runtime behaviour. In: Proc. of 9th Int. Work. on Software Specification & Design (1998)
Kannan, S., et al.: Runtime monitoring and steering based on formal specifications. In: Workshop on Modeling Software System Structures in a Fastly Moving Scenario (2000)
Kim, M., et al.: Java-MaC: a runtime assurance tool for Java programs. Electr. Notes in Theoretical Computer Science, 55 (2001)
Spanoudakis, G., Kloukinas, C., Androutsopoulos, K.: Towards security monitoring patterns. In: ACM Symposium on Applied Computing (SAC07) - Track on Software Verification, Seoul, Korea, vol. 2, pp. 1518–1525. ACM, New York (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kloukinas, C., Spanoudakis, G. (2007). A Pattern-Driven Framework for Monitoring Security and Dependability. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2007. Lecture Notes in Computer Science, vol 4657. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74409-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-74409-2_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74408-5
Online ISBN: 978-3-540-74409-2
eBook Packages: Computer ScienceComputer Science (R0)