Abstract
In this paper we describe a framework that supports the dynamic configuration, adaptation and monitoring of systems that need to guarantee specific security and dependability (S&D) properties whilst operating in distributed settings. The framework is based on patterns providing abstract specifications of implementation solutions that can be used by systems in order to achieve specific S&D properties. The focus herein will be on the monitoring aspects of the framework which allow it to adapt to violations of the S&D requirements and changes to the current context.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Maña, A., et al.: Security engineering for ambient intelligence: A manifesto. In: Integrating Security and Software Engineering: Advances and Future Vision, pp. 244–270. Idea Group Publishing (2006)
Sanchez-Cid, F., et al.: Software engineering techniques applied to AmI: Security patterns. In: Developing Ambient Intelligence: Proc. of the First Int. Conf. on Ambient Intelligence Developments (AmID 2006), Sophia-Antipolis, France, Springer, Heidelberg (2006)
Campadello, S., et al.: S&D requirements specification. Deliverable A7.D2.1, SERENITY Project (2006), Available from http://www.serenity-forum.org
Maña, A., et al.: Patterns and integration schemes languages. Deliverable A5.D2.1, SERENITY Project (2006), Available from http://www.serenity-forum.org
Shanahan, M.P.: The event calculus explained. In: Veloso, M.M., Wooldridge, M.J. (eds.) Artificial Intelligence Today. LNCS (LNAI), vol. 1600, pp. 409–430. Springer, Heidelberg (1999)
Melton, R., Garlan, D.: Architectural Unification. In: Proceedings of CASCON 1997, Ontario, Canada (1997)
Spanoudakis, G., Mahbub, K.: Non intrusive monitoring of service based systems. International Journal of Cooperative Information Systems 15, 325–358 (2006)
Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Dept. of Computer Engineering, Chalmers Univ. (2000)
Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 7, 1289–1296 (2000)
Anagnostakis, K., et al.: Detecting targeted attacks using shadow honeypots. In: Proc. of the 14t h USENIX Security Symposium (2005)
Labbe, K., et al.: A methodology for evaluation of host-based intrusion prevention systems and its application. In: Proc. of the 7th IEEE Work. on Information Assurance (2006)
Corradi, A., et al.: Context-based access control management in ubiquitous environments. In: Third IEEE Int. Symp. on Network Computing and Applications, pp. 253–260. IEEE Computer Society Press, Los Alamitos (2004)
Hulsebosch, J., et al.: Context sensitive access control. In: Proc. of the Tenth ACM Symp. on Access Control Models and Technologies, SACMAT 2005, pp. 111–119. ACM Press, New York (2005)
Robinson, W.: Monitoring software requirements using instrumented code. In: Proc. of the Hawaii Int. Conf. on Systems Sciences, 2002, Hawaii, USA (2002)
Feather, M., et al.: Reconciling system requirements and runtime behaviour. In: Proc. of 9th Int. Work. on Software Specification & Design (1998)
Kannan, S., et al.: Runtime monitoring and steering based on formal specifications. In: Workshop on Modeling Software System Structures in a Fastly Moving Scenario (2000)
Kim, M., et al.: Java-MaC: a runtime assurance tool for Java programs. Electr. Notes in Theoretical Computer Science, 55 (2001)
Spanoudakis, G., Kloukinas, C., Androutsopoulos, K.: Towards security monitoring patterns. In: ACM Symposium on Applied Computing (SAC07) - Track on Software Verification, Seoul, Korea, vol. 2, pp. 1518–1525. ACM, New York (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kloukinas, C., Spanoudakis, G. (2007). A Pattern-Driven Framework for Monitoring Security and Dependability. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2007. Lecture Notes in Computer Science, vol 4657. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74409-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-74409-2_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74408-5
Online ISBN: 978-3-540-74409-2
eBook Packages: Computer ScienceComputer Science (R0)