2020
DOI: 10.1016/j.future.2020.03.031
|View full text |Cite
|
Sign up to set email alerts
|

MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 40 publications
(15 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…The general procedure can be described by a MAPE loop [74,140]: Constant (M)onitoring of the environment and reflecting changes in a model, (A)nalyzing the model for requirement violations, (P)lanning appropriate countermeasures, and finally (E)xecuting those and updating the model. A MAPE-K loop enhances MAPE with a knowledge base [9,117], while MAPE-SAC introduces security aspects in the control loop [67]. Auto-scaling approaches are usually realized via a MAPE(-K) loop.…”
Section: Combined Mechanismsmentioning
confidence: 99%
“…The general procedure can be described by a MAPE loop [74,140]: Constant (M)onitoring of the environment and reflecting changes in a model, (A)nalyzing the model for requirement violations, (P)lanning appropriate countermeasures, and finally (E)xecuting those and updating the model. A MAPE-K loop enhances MAPE with a knowledge base [9,117], while MAPE-SAC introduces security aspects in the control loop [67]. Auto-scaling approaches are usually realized via a MAPE(-K) loop.…”
Section: Combined Mechanismsmentioning
confidence: 99%
“…Even though some recent works have proposed reliable mechanisms for the integrating multiple CLs [29,24] and the coordination of CLs has been addressed in other fields, e.g., supply chain [22,14], the coordination of multiple CLs is still an open question for research in telecommunications. Telecommunications systems are highly stochastic and not well-bounded systems, which makes it harder to create models required for the application of control theory or learning techniques, for instance from the field of game theory.…”
Section: Related Workmentioning
confidence: 99%
“…To manage the security concern, the self-adaptive system should consider MAPE (Monitor, Analyse, Plan, and Execute) control loop [63]. In this regard, Jahan et al [42] developed a security-focused feedback control loop, MAPE-SAC, and its interaction with a MAPE-K, function, and performance-focused control loop to dynamically manage runtime adaptations in response to changes in functional and security conditions.…”
Section: Security Assurance Of the Self Adaptive Systemmentioning
confidence: 99%