Adaptive Reasoning in the Presence of Imperfect Security Requirements

Sara Sartoli, Akbar Siami Namin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Self-adaptive systems have received great attention in the last decade. In the context of self-adaptive systems, adaptive security concerns with adjusting protection mechanisms at runtime while changes occur in the operating environment. One of the challenges with self-adaptation paradigm is that the reasoning engine must leverage existing requirements and constraints and at the same time deal with different types of imperfections due to absence of knowledge or data. The problem arises when the existing runtime requirements models offer no explicit support for imperfections. By imperfections, we mean the values of some attributes of interest are not available at certain points. To address this problem, we propose uncertain reasoning based on imperfect requirements using non-monotonic logic. We model security requirements, system executions and changes in operation environment through non-monotonic logic that explicitly represents imperfect information and accounts for uncertainty.

Original languageEnglish
Title of host publicationProceedings - 2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016
EditorsWilliam Claycomb, Dejan Milojicic, Ling Liu, Mihhail Matskin, Zhiyong Zhang, Sorel Reisman, Hiroyuki Sato, Zhiyong Zhang, Sheikh Iqbal Ahamed
PublisherIEEE Computer Society
Pages498-499
Number of pages2
ISBN (Electronic)9781467388450
DOIs
StatePublished - Aug 24 2016
Event2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016 - Atlanta, United States
Duration: Jun 10 2016Jun 14 2016

Publication series

NameProceedings - International Computer Software and Applications Conference
Volume1
ISSN (Print)0730-3157

Conference

Conference2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016
Country/TerritoryUnited States
CityAtlanta
Period06/10/1606/14/16

Keywords

  • Formal Methods
  • Logic Programming
  • Security Requirements
  • Self-Adaptive Systems

Fingerprint

Dive into the research topics of 'Adaptive Reasoning in the Presence of Imperfect Security Requirements'. Together they form a unique fingerprint.

Cite this