Adaptive security systems aim to protect critical assets in the face of changes in their operational environment. We have argued that incorporating an explicit representation of the environment’s topology enables reasoning on the location of assets being protected and the proximity of potentially harmful agents. This paper proposes to engineer topology aware adaptive security systems by identifying violations of security requirements that may be caused by topological changes, and selecting a set of security controls that prevent such violations. Our approach focuses on physical topologies; it maintains at runtime a live representation of the topology which is updated when assets or agents move, or when the structure of the physic...
Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets ...
Abstract—Security is primarily concerned with protecting assets from harm. Identifying and evaluatin...
Specification and traceability of security requirements is still a challenge since modeling and anal...
Adaptive security systems aim to protect critical assets in the face of changes in their operationa...
Adaptive security systems aim to protect critical assets in the face of changes in their operational...
Adaptive security systems aim to protect valuable assets in the face of changes in their operational...
Adaptive security systems aim to protect valuable assets in the face of changes in their operational...
This paper presents Ariadne, a tool for engineering topology aware adaptive security for cyber-phys...
This paper presents Ariadne, a tool for engineering topology aware adaptive security for cyber-physi...
peer-reviewedUbiquitous computing is resulting in a proliferation of cyber-physical systems that hos...
Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or manage v...
and other research outputs Engineering topology aware adaptive security: prevent-ing requirements vi...
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities....
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities....
This paper describes how software is able to autonomously adapt its security mechanisms based on kno...
Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets ...
Abstract—Security is primarily concerned with protecting assets from harm. Identifying and evaluatin...
Specification and traceability of security requirements is still a challenge since modeling and anal...
Adaptive security systems aim to protect critical assets in the face of changes in their operationa...
Adaptive security systems aim to protect critical assets in the face of changes in their operational...
Adaptive security systems aim to protect valuable assets in the face of changes in their operational...
Adaptive security systems aim to protect valuable assets in the face of changes in their operational...
This paper presents Ariadne, a tool for engineering topology aware adaptive security for cyber-phys...
This paper presents Ariadne, a tool for engineering topology aware adaptive security for cyber-physi...
peer-reviewedUbiquitous computing is resulting in a proliferation of cyber-physical systems that hos...
Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or manage v...
and other research outputs Engineering topology aware adaptive security: prevent-ing requirements vi...
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities....
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities....
This paper describes how software is able to autonomously adapt its security mechanisms based on kno...
Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets ...
Abstract—Security is primarily concerned with protecting assets from harm. Identifying and evaluatin...
Specification and traceability of security requirements is still a challenge since modeling and anal...