The process group approach to reliable distributed computing
Communications of the ACM
Supporting reconfigurable security policies for mobile programs
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Retargetable and reconfigurable software dynamic translation
Proceedings of the international symposium on Code generation and optimization: feedback-directed and runtime optimization
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
The Specification and Enforcement of Advanced Security Policies
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Software Security Using Software Dynamic Translation
Software Security Using Software Dynamic Translation
Computer
Adaptive trust negotiation and access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Secure and practical defense against code-injection attacks using software dynamic translation
Proceedings of the 2nd international conference on Virtual execution environments
Foundations Of Instrusion Tolerant Systems Oasis
Foundations Of Instrusion Tolerant Systems Oasis
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
JanioS: um serviço de SSH para o Prometheus
Companion Proceedings of the XIV Brazilian Symposium on Multimedia and the Web
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Adaptable, model-driven security engineering for SaaS cloud-based applications
Automated Software Engineering
Hi-index | 0.00 |
Adaptive systems dynamically change their behavior or structure at runtime to respond to environmental changes. This paper considers one class of adaptive systems-those that adapt application-level security mechanisms. Nowadays, adaptive software security is gaining greater attention as a way to balance the tradeoff between systems security and IT infrastructure overhead. Several adaptive security systems have been developed recently supporting hardware-level to application-level reconfiguration. This paper surveys four adaptive application-level security systems and evaluates them in terms of how well they support critical security services (i.e. authentication, authorization, and tolerance) and what level of adaptation they achieve. Based on our evaluation results, we provide recommendations for future research.