Comparison of Adaptive Information Security Approaches

  • Evesti A
  • Ovaska E
N/ACitations
Citations of this article
26Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Dynamically changing environments and threat landscapes require adaptive information security. Adaptive information security makes it possible to change and modify security mechanisms at runtime. Hence, all security decisions are not enforced at design-time. This paper builds a framework to compare security adaptation approaches. The framework contains three viewpoints, that is, adaptation, security, and lifecycle. Furthermore, the paper describes five security adaptation approaches and compares them by means of the framework. The comparison reveals that the existing security adaptation approaches widely cover the information gathering. However, the compared approaches do not describe how to decide a method to perform a security adaptation. Similarly, means how to provide input knowledge for the security adaptation is not covered. Hence, these research areas have to be covered in the future. The achieved results are applicable for software developers when selecting a security adaptation approach and for researchers when considering future research items.

Cite

CITATION STYLE

APA

Evesti, A., & Ovaska, E. (2013). Comparison of Adaptive Information Security Approaches. ISRN Artificial Intelligence, 2013, 1–18. https://doi.org/10.1155/2013/482949

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free