首页> 外文会议>Computer security-ESORICS 2008 >Security Provisioning in Pervasive Environments Using Multi-objective Optimization
【24h】

Security Provisioning in Pervasive Environments Using Multi-objective Optimization

机译:使用多目标优化的普适环境中的安全性配置

获取原文
获取原文并翻译 | 示例

摘要

Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, effective security mechanisms can be quite different from those typically deployed in conventional applications since these mechanisms are constrained by various factors in a pervasive environment. In this paper, we propose a methodology to perform a cost-benefit analysis under such circumstances. Our approach is based on the formulation of a set of constrained multi-objective optimization problems to minimize the residual damage and the cost of security provisioning. We propose the use of workflow profiles to capture the contexts in which a communication channel is used in a pervasive environment. This is used to minimize the cost that the underlying business entity will have to incur in order to keep the workflow secure and running.
机译:普适计算应用程序涉及跨多个组织的信息流。因此,应用程序中的任何安全漏洞都会产生深远的影响。但是,有效的安全机制可能与常规应用程序中通常部署的机制完全不同,因为这些机制在普遍环境中受到各种因素的约束。在本文中,我们提出了一种在这种情况下进行成本效益分析的方法。我们的方法基于一系列受约束的多目标优化问题的制定,以最大程度地减少残留损害和安全配置的成本。我们建议使用工作流配置文件来捕获在普适环境中使用通信渠道的上下文。这用于最小化基础业务实体为保持工作流安全和运行而必须承担的成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号