A Genetic Algorithms-based Approach for Optimized Self-protection in a Pervasive Service Middleware

Weishan Zhang, Mads Ingstrup, Klaus Marius Hansen, Julian Schütte

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

    8 Citations (Scopus)

    Abstract

    With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to achieve self-protection, the corresponding security should be provided in an optimized manner considering the constraints of heterogeneous devices and networks. In this paper, we present a Genetic Algorithms-based approach for obtaining optimized security configurations at run time, supported by a set of security OWL ontologies and an event-driven framework. This approach has been realized as a prototype for self-protection in the Hydra middleware, and is integrated with a framework for enforcing the computed solution at run time using security obligations. The experiments with the prototype on configuring security strategies for a pervasive service middleware show that this approach has acceptable performance, and could be used to automatically adapt security strategies in the middleware.
    Original languageEnglish
    Book seriesLecture Notes in Computer Science
    Pages (from-to)404-419
    Number of pages15
    ISSN0302-9743
    DOIs
    Publication statusPublished - 2009
    EventInternational Conference on Service-Oriented Computing, CSOC-ServiceWave - Stockholm, Sweden
    Duration: 24 Nov 200927 Nov 2009
    Conference number: 7

    Conference

    ConferenceInternational Conference on Service-Oriented Computing, CSOC-ServiceWave
    Number7
    Country/TerritorySweden
    CityStockholm
    Period24/11/200927/11/2009

    Fingerprint

    Dive into the research topics of 'A Genetic Algorithms-based Approach for Optimized Self-protection in a Pervasive Service Middleware'. Together they form a unique fingerprint.

    Cite this