Skip to main content

Development and Runtime Support for Situation-Aware Security in Autonomic Computing

  • Conference paper
Book cover Autonomic and Trusted Computing (ATC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4158))

Included in the following conference series:

Abstract

To overcome increasing complexity and dynamic nature of distributed computing system, such as ubiquitous computing systems, it is critical to have computing systems that can manage themselves according to their users’ goals. Such systems are called autonomic computing systems. It is essential that such systems, especially those for critical applications, have the capability of self-protection from attacks under various situations without much human intervention or guidance. To achieve this goal, situation-aware security (SAS) needs to be considered in the development process. In this paper, a model-driven development framework for SAS in autonomic computing systems is presented. The runtime support for SAS is provided by a situation-aware middleware. The advantages of using the development framework and the situation-aware middleware to build autonomic computing systems with SAS are discussed and illustrated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Computer 36(1), 41–50 (2003)

    Google Scholar 

  2. Yau, S.S., Wang, Y., Karim, F.: Development of Situation-Aware Application Software for Ubiquitous Computing Environments. In: Proc. 26th IEEE Int’l Computer Software and Applications Conf., pp. 233–238 (2002)

    Google Scholar 

  3. Yau, S.S., et al.: Reconfigurable Context-Sensitive Middleware for Pervasive Computing. IEEE Pervasive Computing 1(3), 33–40 (2002)

    Article  Google Scholar 

  4. OMG.: MDA Guide Version 1.01 (accessed 03/18/2006), http://www.omg.org/

  5. Burt, C.C., et al.: Model driven security: unification of authorization models for fine-grain access control. In: Proc. 7th IEEE Int’l Enterprise Distributed Object Computing Conf., pp. 159–171 (2003)

    Google Scholar 

  6. Basin, D., Doser, J.r., Lodderstedt, T.: Model driven security for process-oriented systems. In: Proc. 8th ACM Symp. Access Control Models and Tech, pp. 100–109 (2003)

    Google Scholar 

  7. Jürjens, J.: Model-Based Security Engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 42–77. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Nakamura, Y., et al.: Model-Driven Security Based on a Web Services Security Architecture. In: Proc. 2005 IEEE Int’l Conf. on Services Computing, pp. 7–15 (2005)

    Google Scholar 

  9. Epstein, P., Sandhu, R.: Towards a UML based approach to role engineering. In: Proc. 4th ACM Workshop on Role-Based Access Control, pp. 135–143 (1999)

    Google Scholar 

  10. Shin, M.E., Ahn, G.-J.: UML-Based Representation of Role-Based Access Control. In: Proc. 9th IEEE Int’l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 195–200 (2000)

    Google Scholar 

  11. Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002)

    Google Scholar 

  12. Doan, T., et al.: MAC and UML for secure software design. In: Proc. ACM Workshop on Formal Methods in Security Eng., pp. 75–85 (2004)

    Google Scholar 

  13. OASIS.: Security Assertion Markup Language (SAML) Version 2.0 (accessed on 03/18/2006), http://www.oasis-open.org/

  14. OASIS.: eXtensible Access Control Markup Language (XACML) version 2.0 (accessed on 03/18/2006), http://docs.oasis-open.org/xacml/

  15. WS-Security (accessed on 03/18/2006), http://www.ibm.com/developerworks/

  16. WS Security Policy (accessed on 03/18/2006), http://www.ibm.com/developerworks/

  17. Bhargavan, K., Fournet, C., Gordon, A.D.: A semantics for web services authentication. In: Proc. 31st ACM Symp. on Principles of Programming Languages, pp. 198–209 (2004)

    Google Scholar 

  18. Bertino, E., et al.: Temporal Authorization Bases: From Specification to Integration. Jour. Computer Security 8(4), 309–354 (2000)

    Google Scholar 

  19. Jajodia, S., et al.: Flexible Supporting for Multiple Access Control Policies. ACM Trans. on Database Systems 26(2), 214–260 (2001)

    Article  MATH  Google Scholar 

  20. Uszok, A., et al.: KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement. In: Proc. IEEE 4th Int’l Workshop on Policies for Distributed Systems and Networks, pp. 93–96 (2003)

    Google Scholar 

  21. Yau, S.S., el al.: Automated Agent Synthesis for Situation-Aware Service Coordination in Service-based Systems, Technical Report, Arizona State University (August 2005)

    Google Scholar 

  22. Yau, S.S., Yao, Y., Banga, V.: Situation-Aware Access Control for Service-Oriented Autonomous Decentralized Systems. In: Proc. 7th Int’l Symp. on Autonomous Decentralized Systems, pp. 17–24 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yau, S.S., Yao, Y., Yan, M. (2006). Development and Runtime Support for Situation-Aware Security in Autonomic Computing. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds) Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science, vol 4158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11839569_17

Download citation

  • DOI: https://doi.org/10.1007/11839569_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38619-3

  • Online ISBN: 978-3-540-38622-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics