Abstract
To overcome increasing complexity and dynamic nature of distributed computing system, such as ubiquitous computing systems, it is critical to have computing systems that can manage themselves according to their users’ goals. Such systems are called autonomic computing systems. It is essential that such systems, especially those for critical applications, have the capability of self-protection from attacks under various situations without much human intervention or guidance. To achieve this goal, situation-aware security (SAS) needs to be considered in the development process. In this paper, a model-driven development framework for SAS in autonomic computing systems is presented. The runtime support for SAS is provided by a situation-aware middleware. The advantages of using the development framework and the situation-aware middleware to build autonomic computing systems with SAS are discussed and illustrated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Computer 36(1), 41–50 (2003)
Yau, S.S., Wang, Y., Karim, F.: Development of Situation-Aware Application Software for Ubiquitous Computing Environments. In: Proc. 26th IEEE Int’l Computer Software and Applications Conf., pp. 233–238 (2002)
Yau, S.S., et al.: Reconfigurable Context-Sensitive Middleware for Pervasive Computing. IEEE Pervasive Computing 1(3), 33–40 (2002)
OMG.: MDA Guide Version 1.01 (accessed 03/18/2006), http://www.omg.org/
Burt, C.C., et al.: Model driven security: unification of authorization models for fine-grain access control. In: Proc. 7th IEEE Int’l Enterprise Distributed Object Computing Conf., pp. 159–171 (2003)
Basin, D., Doser, J.r., Lodderstedt, T.: Model driven security for process-oriented systems. In: Proc. 8th ACM Symp. Access Control Models and Tech, pp. 100–109 (2003)
Jürjens, J.: Model-Based Security Engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 42–77. Springer, Heidelberg (2005)
Nakamura, Y., et al.: Model-Driven Security Based on a Web Services Security Architecture. In: Proc. 2005 IEEE Int’l Conf. on Services Computing, pp. 7–15 (2005)
Epstein, P., Sandhu, R.: Towards a UML based approach to role engineering. In: Proc. 4th ACM Workshop on Role-Based Access Control, pp. 135–143 (1999)
Shin, M.E., Ahn, G.-J.: UML-Based Representation of Role-Based Access Control. In: Proc. 9th IEEE Int’l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 195–200 (2000)
Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002)
Doan, T., et al.: MAC and UML for secure software design. In: Proc. ACM Workshop on Formal Methods in Security Eng., pp. 75–85 (2004)
OASIS.: Security Assertion Markup Language (SAML) Version 2.0 (accessed on 03/18/2006), http://www.oasis-open.org/
OASIS.: eXtensible Access Control Markup Language (XACML) version 2.0 (accessed on 03/18/2006), http://docs.oasis-open.org/xacml/
WS-Security (accessed on 03/18/2006), http://www.ibm.com/developerworks/
WS Security Policy (accessed on 03/18/2006), http://www.ibm.com/developerworks/
Bhargavan, K., Fournet, C., Gordon, A.D.: A semantics for web services authentication. In: Proc. 31st ACM Symp. on Principles of Programming Languages, pp. 198–209 (2004)
Bertino, E., et al.: Temporal Authorization Bases: From Specification to Integration. Jour. Computer Security 8(4), 309–354 (2000)
Jajodia, S., et al.: Flexible Supporting for Multiple Access Control Policies. ACM Trans. on Database Systems 26(2), 214–260 (2001)
Uszok, A., et al.: KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement. In: Proc. IEEE 4th Int’l Workshop on Policies for Distributed Systems and Networks, pp. 93–96 (2003)
Yau, S.S., el al.: Automated Agent Synthesis for Situation-Aware Service Coordination in Service-based Systems, Technical Report, Arizona State University (August 2005)
Yau, S.S., Yao, Y., Banga, V.: Situation-Aware Access Control for Service-Oriented Autonomous Decentralized Systems. In: Proc. 7th Int’l Symp. on Autonomous Decentralized Systems, pp. 17–24 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yau, S.S., Yao, Y., Yan, M. (2006). Development and Runtime Support for Situation-Aware Security in Autonomic Computing. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds) Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science, vol 4158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11839569_17
Download citation
DOI: https://doi.org/10.1007/11839569_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38619-3
Online ISBN: 978-3-540-38622-3
eBook Packages: Computer ScienceComputer Science (R0)