• DocumentCode
    257596
  • Title

    Engineering topology aware adaptive security: Preventing requirements violations at runtime

  • Author

    Tsigkanos, Christos ; Pasquale, Liliana ; Menghi, Claudio ; Ghezzi, Carlo ; Nuseibeh, Bashar

  • Author_Institution
    Politec. di Milano, Milan, Italy
  • fYear
    2014
  • fDate
    25-29 Aug. 2014
  • Firstpage
    203
  • Lastpage
    212
  • Abstract
    Adaptive security systems aim to protect critical assets in the face of changes in their operational environment. We have argued that incorporating an explicit representation of the environment´s topology enables reasoning on the location of assets being protected and the proximity of potentially harmful agents. This paper proposes to engineer topology aware adaptive security systems by identifying violations of security requirements that may be caused by topological changes, and selecting a set of security controls that prevent such violations. Our approach focuses on physical topologies; it maintains at runtime a live representation of the topology which is updated when assets or agents move, or when the structure of the physical space is altered. When the topology changes, we look ahead at a subset of the future system states. These states are reachable when the agents move within the physical space. If security requirements can be violated in future system states, a configuration of security controls is proactively applied to prevent the system from reaching those states. Thus, the system continuously adapts to topological stimuli, while maintaining requirements satisfaction. Security requirements are formally expressed using a propositional temporal logic, encoding spatial properties in Computation Tree Logic (CTL). The Ambient Calculus is used to represent the topology of the operational environment - including location of assets and agents - as well as to identify future system states that are reachable from the current one. The approach is demonstrated and evaluated using a substantive example concerned with physical access control.
  • Keywords
    authorisation; data flow analysis; formal specification; temporal logic; access control; adaptive security systems; ambient calculus; computation tree logic; encoding spatial properties; potentially harmful agents; propositional temporal logic; requirements violation prevention; security controls; security requirements; topology aware adaptive security engineering; Aerospace electronics; Buildings; Calculus; Runtime; Security; Servers; Topology;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Requirements Engineering Conference (RE), 2014 IEEE 22nd International
  • Conference_Location
    Karlskrona
  • Print_ISBN
    978-1-4799-3031-9
  • Type

    conf

  • DOI
    10.1109/RE.2014.6912262
  • Filename
    6912262