Towards a UML based approach to role engineering
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Temporal authorization bases: from specification to integration
Journal of Computer Security - Special issue on database security
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Reconfigurable Context-Sensitive Middleware for Pervasive Computing
IEEE Pervasive Computing
The Vision of Autonomic Computing
Computer
Development of Situation-Aware Application Software for Ubiquitous Computing Environment
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
UML-Based Representation of Role-Based Access Control
WETICE '00 Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Model driven security for process-oriented systems
Proceedings of the eighth ACM symposium on Access control models and technologies
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
EDOC '03 Proceedings of the 7th International Conference on Enterprise Distributed Object Computing
A semantics for web services authentication
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
MAC and UML for secure software design
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Model-Driven Security Based on a Web Services Security Architecture
SCC '05 Proceedings of the 2005 IEEE International Conference on Services Computing - Volume 01
Design of service-based systems with adaptive tradeoff between security and service delay
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
To overcome increasing complexity and dynamic nature of distributed computing system, such as ubiquitous computing systems, it is critical to have computing systems that can manage themselves according to their users’ goals. Such systems are called autonomic computing systems. It is essential that such systems, especially those for critical applications, have the capability of self-protection from attacks under various situations without much human intervention or guidance. To achieve this goal, situation-aware security (SAS) needs to be considered in the development process. In this paper, a model-driven development framework for SAS in autonomic computing systems is presented. The runtime support for SAS is provided by a situation-aware middleware. The advantages of using the development framework and the situation-aware middleware to build autonomic computing systems with SAS are discussed and illustrated.