A4 Vertaisarvioitu artikkeli konferenssijulkaisussa

Towards Self-Aware Approach for Mobile Devices Security




TekijätNanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho

ToimittajaRak Jacek, Bay John, Kotenko Igor, Popyack Leonard, Skormin Victor, Szczypiorski Krzysztof

Konferenssin vakiintunut nimiInternational Conference on Mathematical Methods, Models and Architectures for Computer Networks Security

Julkaisuvuosi2017

JournalLecture Notes in Computer Science

Kokoomateoksen nimiComputer Network Security

Sarjan nimiLecture Notes on Computer Science

Vuosikerta10446

Aloitussivu171

Lopetussivu182

Sivujen määrä12

ISBN978-3-319-65126-2

eISBN978-3-319-65127-9

Verkko-osoitehttps://link.springer.com/chapter/10.1007/978-3-319-65127-9_14

Rinnakkaistallenteen osoitehttps://research.utu.fi/converis/portal/detail/Publication/28736864


Tiivistelmä

We present conceptual design of self-aware security for mobile devices. The design is envisioned to bring self-awareness into the mobile devices security for optimal protection by regulating application activities. The proposed design contains three subsystems: meta-level enables self-awareness, extended meta-level extends protections to the base-level components through security mechanisms and base-level comprises of resources that are essential for applications execution. The presented design enables cooperation among security mechanisms (such as access control and anti-virus) as well as with self-aware agent. The cooperation is intended for better understanding of application activities that leads to recognizing threat patterns in advance. When a threat is predicted/detected, the self-aware agent communicates with the security mechanisms so that they can take the necessary actions. The design of the security mechanisms are elaborated using access control system and anti-virus as example cases.


Ladattava julkaisu

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.





Last updated on 2024-26-11 at 22:57