Domain-specific languages: an annotated bibliography
ACM SIGPLAN Notices
An Artificial Intelligence Perspective on Autonomic Computing Policies
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
Security in an autonomic computing environment
IBM Systems Journal
When and how to develop domain-specific languages
ACM Computing Surveys (CSUR)
A Systematic Review and Comparison of Security Ontologies
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Context Ontology for Secure Interoperability
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Applying component-based design to self-protection of ubiquitous systems
Proceedings of the 3rd ACM workshop on Software engineering for pervasive services
Self-TUNe-ing of a J2EE Clustered Application
EASE '09 Proceedings of the 2009 Sixth IEEE Conference and Workshops on Engineering of Autonomic and Autonomous Systems
Ponder2: A Policy System for Autonomous Pervasive Environments
ICAS '09 Proceedings of the 2009 Fifth International Conference on Autonomic and Autonomous Systems
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Self-protection for distributed component-based applications
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
An integrated model for access control and information flow requirements
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A Policy Management Framework for Self-Protection of Pervasive Systems
ICAS '10 Proceedings of the 2010 Sixth International Conference on Autonomic and Autonomous Systems
Putting together QoS and security in autonomic pervasive systems
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
CIT '10 Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology
Using contextual security policies for threat response
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Weaving executability into object-oriented meta-languages
MoDELS'05 Proceedings of the 8th international conference on Model Driven Engineering Languages and Systems
Security ontology for annotating resources
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II
Policy-based management of networked computing systems
IEEE Communications Magazine
Dynamic deployment of context-aware access control policies for constrained security devices
Journal of Systems and Software
QoS aware adaptive security scheme for video streaming in MANETs
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Hi-index | 0.00 |
Existing self-protection frameworks so far hardly addressed the specification of autonomic security adaptation strategies which guide risk-aware selection or reconfiguration of security mechanisms. Domain-Specific Languages (DSL) present many benefits to achieve this goal in terms of simplicity, automated strategy verification, and run-time integration. This paper presents a DSL to describe security adaptation policies. The DSL is based on the condition-action approach and on a taxonomy of threats and applicable reactions. The DSL also allows to capture trade-offs between security and other concerns such as energy efficiency during the decision making phase. A translation mechanism to refine the DSL into a run-time representation, and integrate adaptation policies within legacy self-protection frameworks is also presented.