{"id":"https://openalex.org/W2115141362","doi":"https://doi.org/10.1109/re.2014.6912262","title":"Engineering topology aware adaptive security: Preventing requirements violations at runtime","display_name":"Engineering topology aware adaptive security: Preventing requirements violations at runtime","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W2115141362","doi":"https://doi.org/10.1109/re.2014.6912262","mag":"2115141362"},"language":"en","primary_location":{"id":"doi:10.1109/re.2014.6912262","is_oa":false,"landing_page_url":"https://doi.org/10.1109/re.2014.6912262","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057850035","display_name":"Christos Tsigkanos","orcid":"https://orcid.org/0000-0002-9493-3404"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Christos Tsigkanos","raw_affiliation_strings":["Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049622460","display_name":"Liliana Pasquale","orcid":"https://orcid.org/0000-0001-9673-3054"},"institutions":[{"id":"https://openalex.org/I4210130076","display_name":"Lero","ror":"https://ror.org/038dhnb42","country_code":"IE","type":"other","lineage":["https://openalex.org/I4210130076"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Liliana Pasquale","raw_affiliation_strings":["Lero \u2013 The Irish Software Engineering Research Centre, Limerick, Ireland"],"affiliations":[{"raw_affiliation_string":"Lero \u2013 The Irish Software Engineering Research Centre, Limerick, Ireland","institution_ids":["https://openalex.org/I4210130076"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018466538","display_name":"Claudio Menghi","orcid":"https://orcid.org/0000-0001-5303-8481"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Claudio Menghi","raw_affiliation_strings":["Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024976868","display_name":"Carlo Ghezzi","orcid":"https://orcid.org/0000-0002-7234-5011"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Carlo Ghezzi","raw_affiliation_strings":["Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060861082","display_name":"Bashar Nuseibeh","orcid":"https://orcid.org/0000-0002-3476-053X"},"institutions":[{"id":"https://openalex.org/I204136569","display_name":"The Open University","ror":"https://ror.org/05mzfcs16","country_code":"GB","type":"education","lineage":["https://openalex.org/I204136569"]},{"id":"https://openalex.org/I4210130076","display_name":"Lero","ror":"https://ror.org/038dhnb42","country_code":"IE","type":"other","lineage":["https://openalex.org/I4210130076"]}],"countries":["GB","IE"],"is_corresponding":false,"raw_author_name":"Bashar Nuseibeh","raw_affiliation_strings":["Department of Computing, The Open University, Milton Keynes, UK","Lero \u2013 The Irish Software Engineering Research Centre, Limerick, Ireland"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Open University, Milton Keynes, UK","institution_ids":["https://openalex.org/I204136569"]},{"raw_affiliation_string":"Lero \u2013 The Irish Software Engineering Research Centre, Limerick, Ireland","institution_ids":["https://openalex.org/I4210130076"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5057850035"],"corresponding_institution_ids":["https://openalex.org/I93860229"],"apc_list":null,"apc_paid":null,"fwci":4.7526,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.95362185,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"203","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7051812410354614},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.6061708927154541},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.5288708806037903},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4432040750980377},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.42290353775024414},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4161643981933594},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2299787700176239},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1773800551891327},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.111491858959198},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.0931711494922638}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7051812410354614},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.6061708927154541},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.5288708806037903},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4432040750980377},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.42290353775024414},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4161643981933594},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2299787700176239},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1773800551891327},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.111491858959198},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0931711494922638},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/re.2014.6912262","is_oa":false,"landing_page_url":"https://doi.org/10.1109/re.2014.6912262","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","raw_type":"proceedings-article"},{"id":"pmh:oai:oro.open.ac.uk:41170","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401187","display_name":"Open Research Online (The Open University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204136569","host_organization_name":"The Open University","host_organization_lineage":["https://openalex.org/I204136569"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:aisberg.unibg.it:10446/237231","is_oa":false,"landing_page_url":"https://hdl.handle.net/10446/237231","pdf_url":null,"source":{"id":"https://openalex.org/S4377196347","display_name":"Aisberg (University of Bergamo)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11039511","host_organization_name":"University of Bergamo","host_organization_lineage":["https://openalex.org/I11039511"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:re.public.polimi.it:11311/965206","is_oa":false,"landing_page_url":"http://doi.ieeecomputersociety.org/10.1109/RE.2014.6912262","pdf_url":null,"source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1521217725","https://openalex.org/W1523525039","https://openalex.org/W1533323512","https://openalex.org/W1533883536","https://openalex.org/W1591151606","https://openalex.org/W1819673294","https://openalex.org/W1878237811","https://openalex.org/W1910998188","https://openalex.org/W1964202794","https://openalex.org/W1990911977","https://openalex.org/W2020763085","https://openalex.org/W2030876862","https://openalex.org/W2034590833","https://openalex.org/W2045440241","https://openalex.org/W2048984644","https://openalex.org/W2066150275","https://openalex.org/W2100349944","https://openalex.org/W2118116239","https://openalex.org/W2123298731","https://openalex.org/W2137363082","https://openalex.org/W2142925340","https://openalex.org/W2340735175","https://openalex.org/W2481588761","https://openalex.org/W2911711976","https://openalex.org/W2912003593","https://openalex.org/W2913459036","https://openalex.org/W4285719527","https://openalex.org/W7042404900"],"related_works":["https://openalex.org/W2086397253","https://openalex.org/W2133122801","https://openalex.org/W600422426","https://openalex.org/W2007156430","https://openalex.org/W3081478936","https://openalex.org/W2785612136","https://openalex.org/W2099529706","https://openalex.org/W1988224651","https://openalex.org/W2096179639","https://openalex.org/W2560916850"],"abstract_inverted_index":{"Adaptive":[0],"security":[1,53,59,73,141,153],"systems":[2,54],"aim":[3],"to":[4,48,158,171,201,220],"protect":[5],"critical":[6],"assets":[7,35,99,213],"in":[8,13,146,191],"the":[9,26,32,39,93,105,108,114,124,133,137,160,167,203,206,229],"face":[10],"of":[11,25,34,41,58,72,92,107,123,152,205,212],"changes":[12],"their":[14],"operational":[15,207],"environment.":[16],"We":[17],"have":[18],"argued":[19],"that":[20,61,75,225],"incorporating":[21],"an":[22],"explicit":[23],"representation":[24,91],"environment's":[27],"topology":[28,50,94,115,204],"enables":[29],"reasoning":[30],"on":[31,82],"location":[33,211],"being":[36],"protected":[37],"and":[38,68,214,236],"proximity":[40],"potentially":[42],"harmful":[43],"agents.":[44],"This":[45],"paper":[46],"proposes":[47],"engineer":[49],"aware":[51],"adaptive":[52],"by":[55,65],"identifying":[56],"violations":[57],"requirements":[60,142,176,179],"may":[62],"be":[63,144],"caused":[64],"topological":[66,172],"changes,":[67,116],"selecting":[69],"a":[70,89,121,150,184,239],"set":[71],"controls":[74,154],"prevent":[76,159],"such":[77],"violations.":[78],"Our":[79],"approach":[80,233],"focuses":[81],"physical":[83,109,138,244],"topologies;":[84],"it":[85],"maintains":[86],"at":[87,120],"runtime":[88],"live":[90],"which":[95],"is":[96,111,155,199,234],"updated":[97],"when":[98,104,132],"or":[100,103],"agents":[101,134,215],"move,":[102],"structure":[106],"space":[110],"altered.":[112],"When":[113],"we":[117],"look":[118],"ahead":[119],"subset":[122],"future":[125,147,222],"system":[126,148,161,168,223],"states.":[127,165],"These":[128],"states":[129,224],"are":[130,180,226],"reachable":[131,227],"move":[135],"within":[136],"space.":[139],"If":[140],"can":[143],"violated":[145],"states,":[149],"configuration":[151],"proactively":[156],"applied":[157],"from":[162,228],"reaching":[163],"those":[164],"Thus,":[166],"continuously":[169],"adapts":[170],"stimuli,":[173],"while":[174],"maintaining":[175],"satisfaction.":[177],"Security":[178],"formally":[181],"expressed":[182],"using":[183,238],"propositional":[185],"temporal":[186],"logic,":[187],"encoding":[188],"spatial":[189],"properties":[190],"Computation":[192],"Tree":[193],"Logic":[194],"(CTL).":[195],"The":[196,232],"Ambient":[197],"Calculus":[198],"used":[200],"represent":[202],"environment":[208],"-":[209,216],"including":[210],"as":[217,219],"well":[218],"identify":[221],"current":[230],"one.":[231],"demonstrated":[235],"evaluated":[237],"substantive":[240],"example":[241],"concerned":[242],"with":[243],"access":[245],"control.":[246]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
