DocumentCode
2960302
Title
Security service adaptation for embedded service systems in changing environments
Author
Illner, Stefan ; Pohl, Andre ; Krumm, Heiko
Author_Institution
FB Informatik, Universitat Dortmund
fYear
2004
fDate
26-26 June 2004
Firstpage
457
Lastpage
462
Abstract
Distributed embedded applications increasingly operate in changing environments where the application security depends on the type and properties of the currently used communication services and employed devices. While vulnerabilities, threats, and available security function processing power are changing, the applications, however, should automatically adapt to the varying conditions in order to maintain the necessary security without endeavor of users. We report on the security management subproject of the SIRENA project where we apply a special combination of policy-based management with model-based management in order to support fully automated security management functions at runtime as well as tool-assisted security requirement definition and system design. Within an application model, the definition of the application´s high-level security policy is of special importance. It represents the abstract security requirements and forms the starting point for the automated derivation of suitable security subsystem configurations which enforce the policy under changing environment conditions. The abstract policy representation relies on the generalized role based access control model (GRBAC)
Keywords
embedded systems; security of data; telecommunication computing; telecommunication network management; telecommunication security; telecommunication services; SIRENA project; distributed embedded applications; embedded service systems; fully automated security management functions; generalized role based access control model; model-based management; policy-based management; security service adaptation; tool-assisted security requirement definition; Automotive engineering; Communication industry; Cryptography; Network servers; Object oriented modeling; Power system management; Power system modeling; Power system security; Telecommunication computing; Workstations;
fLanguage
English
Publisher
ieee
Conference_Titel
Industrial Informatics, 2004. INDIN '04. 2004 2nd IEEE International Conference on
Conference_Location
Berlin
Print_ISBN
0-7803-8513-6
Type
conf
DOI
10.1109/INDIN.2004.1417387
Filename
1417387
Link To Document