Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Towards architecture-based self-healing systems
WOSS '02 Proceedings of the first workshop on Self-healing systems
From a Trickle to a Flood: Active Attacks on Several Mix Types
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Calculating costs for quality of security service
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
The dawning of the autonomic computing era
IBM Systems Journal
Security in an autonomic computing environment
IBM Systems Journal
Deriving Systems Level Security Properties of Component Based Composite Systems
ASWEC '05 Proceedings of the 2005 Australian conference on Software Engineering
QoS-aware Mobile Middleware for Video Streaming
EUROMICRO '05 Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications
Using Architecture Models for Runtime Adaptability
IEEE Software
QoS analysis for component-based embedded software: Model and methodology
Journal of Systems and Software
Software—Practice & Experience
ICDT '06 Proceedings of the international conference on Digital Telecommunications
A Utility-Based Adaptivity Model for Mobile Applications
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Towards security and QoS optimization in real-time embedded systems
ACM SIGBED Review - Special issue: The work-in-progress (WIP) session of the RTSS 2005
A QoS and Security Adaptation Model for Autonomic Pervasive Systems
COMPSAC '08 Proceedings of the 2008 32nd Annual IEEE International Computer Software and Applications Conference
An Adaptive Tradeoff Model for Service Performance and Security in Service-Based Systems
ICWS '09 Proceedings of the 2009 IEEE International Conference on Web Services
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
A Policy Management Framework for Self-Protection of Pervasive Systems
ICAS '10 Proceedings of the 2010 Sixth International Conference on Autonomic and Autonomous Systems
A component-based planning framework for adaptive systems
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II
Security ontology for annotating resources
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II
A DSL for specifying autonomic security management strategies
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
QoS aware adaptive security scheme for video streaming in MANETs
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Current pervasive systems tend to consider security and QoS separately, ignoring the influence of each aspect on the other. This paper presents an adaptation model based on selection of component compositions enabling to capture dynamic and fine-grained trade-offs between both QoS and security in those systems. The model is multi-constraints and utility-based, and takes into account computing resources, the perceived risk level, and user preferences. We illustrate through a case study of a typical Beyond 3G adaptive multimedia streaming service how the model may be applied to find the right balance between different QoS and security dimensions.