Inside Java 2 platform security architecture, API design, and implementation
Inside Java 2 platform security architecture, API design, and implementation
Secure distributed storage and retrieval
Theoretical Computer Science
The dawning of the autonomic computing era
IBM Systems Journal
IBM Systems Journal - End-to-end security
Architecture for an Artificial Immune System
Evolutionary Computation
Automated response using system-call delays
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
The dawning of the autonomic computing era
IBM Systems Journal
Security in autonomic computing
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
Autonomic computing: emerging trends and open problems
DEAS '05 Proceedings of the 2005 workshop on Design and evolution of autonomic application software
The claim tool kit for ad hoc recognition of peer entities
Science of Computer Programming - Special issue on principles and practice of programming in java (PPPJ 2003)
Goal-oriented specification of adaptation requirements engineering in adaptive systems
Proceedings of the 2006 international workshop on Self-adaptation and self-managing systems
A survey of autonomic communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Trust by design: information requirements for appropriate trust in automation
CASCON '06 Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research
Guest Editorial: From intrusion detection to self-protection
Computer Networks: The International Journal of Computer and Telecommunications Networking
Autonomic computing: Architectural approach and prototype
Integrated Computer-Aided Engineering
Information Security Tech. Report
Immunological inspiration for building a new generation of autonomic systems
Proceedings of the 1st international conference on Autonomic computing and communication systems
Applying component-based design to self-protection of ubiquitous systems
Proceedings of the 3rd ACM workshop on Software engineering for pervasive services
Analysis of autonomic computing concepts in computational grid based on the ACLM model
SEPADS'08 Proceedings of the 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Security Contexts in Autonomic Systems
Computational Intelligence and Security
Anomaly detection in the case of message oriented middleware
Proceedings of the 2008 workshop on Middleware security
Danger theory based SYN flood attack detection in autonomic network
Proceedings of the 2nd international conference on Security of information and networks
Brief Announcement: An OS Architecture for Device Self-protection
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Dynamic security reconfiguration for the semantic web
Engineering Applications of Artificial Intelligence
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
A software framework for autonomic security in pervasive environments
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Bottom-up design patterns and the energy web
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Putting together QoS and security in autonomic pervasive systems
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
A DSL for specifying autonomic security management strategies
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Autonomic and trusted computing paradigms
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Security in persistently reactive systems
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A self-healing mechanism for an intrusion tolerance system
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Trust management issues for ad hoc and self-organized networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Automated trust negotiation in autonomic environments
IWSOS'07 Proceedings of the Second international conference on Self-Organizing Systems
A security adaptation reference monitor for wireless sensor network
ISRN Communications and Networking
Architecture-based self-protecting software systems
Proceedings of the 9th international ACM Sigsoft conference on Quality of software architectures
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
System and network security are vital parts of any autonomic computing solution. The ability of a system to react consistently and correctly to situations ranging from benign but unusual events to outright attacks is key to the achievement of the goals of self-protection, self-healing, and self-optimization. Because they are often built around the interconnection of elements from different administrative domains, autonomic systems raise additional security challenges, including the establishment of a trustworthy system identity, automatically handling changes in system configuration and interconnections, and greatly increased configuration complexity. On the other hand, the techniques of autonomic computing offer the promise of making systems more secure, by effectively and automatically enforcing high-level security policies. In this paper, we discuss these and other security and privacy challenges posed by autonomic systems and provide some recommendations for how these challenges may be met.