An introduction to genetic algorithms
An introduction to genetic algorithms
Extending Planning Graphs to an ADL Subset
ECP '97 Proceedings of the 4th European Conference on Planning: Recent Advances in AI Planning
The many faces of publish/subscribe
ACM Computing Surveys (CSUR)
Adaptive trust negotiation and access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Communications of the ACM - Privacy and security in highly dynamic systems
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Self-Managed Systems: an Architectural Challenge
FOSE '07 2007 Future of Software Engineering
A Survey of Approaches to Adaptive Application Security
SEAMS '07 Proceedings of the 2007 International Workshop on Software Engineering for Adaptive and Self-Managing Systems
CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications
IEEE Transactions on Software Engineering
Semantic Web Based Self-Management for a Pervasive Service Middleware
SASO '08 Proceedings of the 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems
Ponder2: A Policy System for Autonomous Pervasive Environments
ICAS '09 Proceedings of the 2009 Fifth International Conference on Autonomic and Autonomous Systems
ICECCS '09 Proceedings of the 2009 14th IEEE International Conference on Engineering of Complex Computer Systems
Advances in artificial immune systems
IEEE Computational Intelligence Magazine
Multiobjective evolutionary algorithms: a comparative case studyand the strength Pareto approach
IEEE Transactions on Evolutionary Computation
QoS-Aware Self-adaptation of Communication Protocols in a Pervasive Service Middleware
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Applying qos-aware service selection on functionally diverse services
ICSOC'11 Proceedings of the 2011 international conference on Service-Oriented Computing
Hi-index | 0.00 |
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to achieve self-protection, the corresponding security should be provided in an optimized manner considering the constraints of heterogeneous devices and networks. In this paper, we present a Genetic Algorithms-based approach for obtaining optimized security configurations at run time, supported by a set of security OWL ontologies and an event-driven framework. This approach has been realized as a prototype for self-protection in the Hydra middleware, and is integrated with a framework for enforcing the computed solution at run time using security obligations. The experiments with the prototype on configuring security strategies for a pervasive service middleware show that this approach has acceptable performance, and could be used to automatically adapt security strategies in the middleware.