Dynamic Adaptation and Reconfiguration of Security in Mobile Devices

被引:0
|
作者
Amoud, Mohamed [1 ]
Roudies, Ounsa [1 ]
机构
[1] Mohammed V Univ, SIWeb Team, EMI, Rabat, Morocco
关键词
Adaptive Security; Autonomic Computing; MAPE-K; Dynamic Software Product Lines; Mobile Devices;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Devices offer enriched services and information for the end users. Achieving security in such a dynamic and heterogeneous environment is a challenging task. Hence, adaptive security is an applicable solution for this challenge. It is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. In this paper, we propose a self-adaptive security solution for Mobile Devices (Smartphone, Tablets, ...) based on the combination of the MAPE-K reference model to dynamic negotiate and deploy of security policies, and DSPL approach to reconfigure the security level of the applications at runtime and monitor the changes in the context. The novelty of our approach comes from dynamic negotiation of security policies and automatic reconfiguration of security level to instantiate the new security policies at runtime in order to be capable of deploying adaptive security mechanisms to satisfy different security needs at different conditions.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A static or dynamic reconfiguration method of security functions for mobile devices by using the security profiles
    Park, Wonjoo
    Kang, Dongho
    Kim, Kiyoung
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 146 - 150
  • [2] A dynamic security adaptation mechanism for mobile agents
    Wang, Z
    Guo, ZW
    WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2, 2004, : 634 - 639
  • [3] Dynamic user interface adaptation for mobile computing devices
    Bisignano, M
    Di Modica, G
    Tomarchio, O
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 158 - 161
  • [4] Dynamic reconfiguration in mobile systems
    Smit, GJM
    Havinga, PJM
    Smit, LT
    Heysters, PM
    Rosien, MAJ
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS: RECONFIGURABLE COMPUTING IS GOING MAINSTREAM, 2002, 2438 : 171 - 181
  • [5] Dynamic Adaptation through Event Reconfiguration
    Truong Giang Le
    Hermant, Olivier
    Manceny, Matthieu
    Pawlak, Renaud
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2011 WORKSHOPS, 2011, 7046 : 637 - 646
  • [6] Dynamic security reconfiguration for the semantic web
    Tan, JJ
    Poslad, S
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2004, 17 (07) : 783 - 797
  • [7] Critical Variable Partitioning for Reconfiguration of Mobile Devices
    Loonkar, Shweta
    Kurup, Lakshmi
    TECHNOLOGY SYSTEMS AND MANAGEMENT, 2011, 145 : 10 - 17
  • [8] Overview of Security on Mobile Devices
    Aron, Lukas
    Hanacek, Petr
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [9] Security Issues for Mobile Devices
    Andreeski, Cvetko
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 36 - 48
  • [10] A Survey on Security for Mobile Devices
    La Polla, Mariantonietta
    Martinelli, Fabio
    Sgandurra, Daniele
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 446 - 471