Self-Protection
by
Benedikt Liegener
—
last modified
Apr 27, 2012 14:53
—
filed under:
KnowledgeModel
Definitions
Term: Self-Protection |
Domain: Cross-cutting issues | ||||
---|---|---|---|---|---|
Engineering and Design (KM-ED) |
Adaptation and Monitoring (KM-AM) |
Quality Definition, Negotiation and
Assurance (KM-QA) |
Generic (domain independent) |
||
D o m a i n : L a y e r s |
Business Process Management (KM-BPM) |
Self-protection is the ability of the system to
protect its self from the web-based intrusion and malware when the
management system towards monitoring detects user as well as hacker
attendding to corrupt the managment process and services. [CD JRA
1.2.1] |
|||
Service Composition and
Coordination (KM-SC) |
|||||
Service Infrastructure (KM-SI) |
|||||
Generic (domain independent) |
Systems anticipate, detect, identify, and protect
themselves from attacks from anywhere. Self-protecting systems must
have the ability to define and manage user access to all computing
resources within the enterprise, to protect against unauthorized
resource access, to detect intrusions and report and prevent these
activities as they occur, and to provide backup and recovery
capabilities that are as secure as the original resource management
systems. [Ganek & Corby, 2003] |
Self-Protection is called the ability of a computing component to defend the system as a whole against large-scale, correlated problems arising from malicious attacks or cascading failuresthat remain uncorrected by self-healingmeasures; to anticipate problems form early reports and take steps to avoid or mitigate them. [CD-IA-1.1.1][AutonomicVision] {SYN: Self-Protective} |
Competencies
- UniDue: Engineering Adaptive Service-based Systems; http://www.sse.uni-due.de/wms/en/?go=325; Klaus Pohl, Andreas Metzger, Andreas Gehlert
- UCBL: Privacy;http://liris.cnrs.fr/equipes?id=61&set_language=en; Salima Benbernou
Scenarios
- Wine Scenario, Automotive Scenario: The system could be able to define and manage user accesses to all computing resources belonging to the applications.
References
- [CD-IA-1.1.1] "Comprehensive overview of the state of the art on service-based systems"
- [Ganek & Corby, 2003] Ganek A. G. , Corbi T. A., The dawning of the autonomic computing era,ISM System Journals, Autonomic Computing, Volume 42, Numer 1, 2003
- [AutonomicVision] J.O.Kephart, D.M. Chess: The vision of autonomic computing, IEEE Computer N 36 pp 41-50, 2003
- [CD JRA 1.2.1] "State of the art on monitoring and adapation"
- [PO-JRA-2.3.1] "Use case description and state of the art"