DocumentCode :
257596
Title :
Engineering topology aware adaptive security: Preventing requirements violations at runtime
Author :
Tsigkanos, Christos ; Pasquale, Liliana ; Menghi, Claudio ; Ghezzi, Carlo ; Nuseibeh, Bashar
Author_Institution :
Politec. di Milano, Milan, Italy
fYear :
2014
fDate :
25-29 Aug. 2014
Firstpage :
203
Lastpage :
212
Abstract :
Adaptive security systems aim to protect critical assets in the face of changes in their operational environment. We have argued that incorporating an explicit representation of the environment´s topology enables reasoning on the location of assets being protected and the proximity of potentially harmful agents. This paper proposes to engineer topology aware adaptive security systems by identifying violations of security requirements that may be caused by topological changes, and selecting a set of security controls that prevent such violations. Our approach focuses on physical topologies; it maintains at runtime a live representation of the topology which is updated when assets or agents move, or when the structure of the physical space is altered. When the topology changes, we look ahead at a subset of the future system states. These states are reachable when the agents move within the physical space. If security requirements can be violated in future system states, a configuration of security controls is proactively applied to prevent the system from reaching those states. Thus, the system continuously adapts to topological stimuli, while maintaining requirements satisfaction. Security requirements are formally expressed using a propositional temporal logic, encoding spatial properties in Computation Tree Logic (CTL). The Ambient Calculus is used to represent the topology of the operational environment - including location of assets and agents - as well as to identify future system states that are reachable from the current one. The approach is demonstrated and evaluated using a substantive example concerned with physical access control.
Keywords :
authorisation; data flow analysis; formal specification; temporal logic; access control; adaptive security systems; ambient calculus; computation tree logic; encoding spatial properties; potentially harmful agents; propositional temporal logic; requirements violation prevention; security controls; security requirements; topology aware adaptive security engineering; Aerospace electronics; Buildings; Calculus; Runtime; Security; Servers; Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Requirements Engineering Conference (RE), 2014 IEEE 22nd International
Conference_Location :
Karlskrona
Print_ISBN :
978-1-4799-3031-9
Type :
conf
DOI :
10.1109/RE.2014.6912262
Filename :
6912262
Link To Document :
بازگشت