Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Security: for ubiquitous computing
Security: for ubiquitous computing
An authorization infrastructure for nomadic computing
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Adaptive Control
A Middleware Infrastructure for Active Spaces
IEEE Pervasive Computing
Think: A Software Framework for Component-based Operating System Kernels
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
A secure infrastructure for service discovery and access in pervasive computing
Mobile Networks and Applications - Security in mobile computing environments
A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
The dawning of the autonomic computing era
IBM Systems Journal
Security in an autonomic computing environment
IBM Systems Journal
WildCAT: a generic framework for context-aware applications
MPAC '05 Proceedings of the 3rd international workshop on Middleware for pervasive and ad-hoc computing
Security ontology for annotating resources
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II
A lightweight reconfigurable security mechanism for 3G/4G mobile devices
IEEE Wireless Communications
Empowering next-generation wireless personal communication networks
IEEE Communications Magazine
IEEE Communications Magazine
Applying component-based design to self-protection of ubiquitous systems
Proceedings of the 3rd ACM workshop on Software engineering for pervasive services
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.01 |
In Systems Beyond 3G, protection fundamentally needs to be flexible. Due to heterogeneity of access networks and mobile devices, multiple security requirements (e.g., cryptographic algorithms, network security policies) must be addressed. The security infrastructure must also be reconfigurable (e.g., system patches to defeat new attacks) to cope with extremely dynamic conditions. Autonomic security applies the idea of flexibility to the security space itself. It goes a step further than simple adaptation by automating the entire reconfiguration process, thus making the security mechanisms self-responsive. We define an autonomic security framework to build such self-protecting systems. The framework is structured around the different steps of the reconfiguration activity: sense, analyze and respond. We show how flexible access control, authentication, and cryptographic security services can be built on top of our framework, illustrating how autonomic security can be implemented in the terminal and the network.