Adaptive Reasoning in the Presence of Imperfect Security Requirements

Self-adaptive systems have received great attention in the last decade. In the context of self-adaptive systems, adaptive security concerns with adjusting protection mechanisms at runtime while changes occur in the operating environment. One of the challenges with self-adaptation paradigm is that the reasoning engine must leverage existing requirements and constraints and at the same time deal with different types of imperfections due to absence of knowledge or data. The problem arises when the existing runtime requirements models offer no explicit support for imperfections. By imperfections, we mean the values of some attributes of interest are not available at certain points. To address this problem, we propose uncertain reasoning based on imperfect requirements using non-monotonic logic. We model security requirements, system executions and changes in operation environment through non-monotonic logic that explicitly represents imperfect information and accounts for uncertainty.

[1]  Svetha Venkatesh,et al.  Dynamic Privacy in Public Surveillance , 2009, Computer.

[2]  Holger Giese,et al.  Living with Uncertainty in the Age of Runtime Models , 2014, Models@run.time@Dagstuhl.

[3]  Bradley R. Schmerl,et al.  Software Engineering for Self-Adaptive Systems: A Second Research Roadmap , 2010, Software Engineering for Self-Adaptive Systems.

[4]  Sara Sartoli,et al.  Poster: Reasoning Based on Imperfect Context Data in Adaptive Security , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[5]  Martin Gebser,et al.  clasp : A Conflict-Driven Answer Set Solver , 2007, LPNMR.

[6]  Mary Shaw,et al.  Engineering Self-Adaptive Systems through Feedback Loops , 2009, Software Engineering for Self-Adaptive Systems.

[7]  Miroslaw Truszczynski,et al.  Answer set programming at a glance , 2011, Commun. ACM.

[8]  F. Beaufils,et al.  FRANCE , 1979, The Lancet.

[9]  Gordon S. Blair,et al.  Models@ run.time , 2009, Computer.