Learn More
The Open University's repository of research publications and other research outputs " Why can't I do that? " : tracing adaptive security decisions Journal Article (2015). " Why can't I do that? " : tracing adaptive security decisions. EAI Endorsed Transactions on Self-Adaptive Systems, 1(1), article no. e2. For guidance on citations see FAQs. Copyright and(More)
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions about the operational environment often reveal unexpected flaws. To diagnose the causes of violations in security requirements it is(More)
This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The challenge for cloud providers is how they customise the software that is hosted in their SaaS model where multiple clients share the same(More)
The Open University's repository of research publications and other research outputs " Why can't I do that? " : tracing adaptive security decisions Journal Article (2015). " Why can't I do that? " : tracing adaptive security decisions. EAI Endorsed Transactions on Self-Adaptive Systems, 1(1), article no. e2. For guidance on citations see FAQs. Copyright and(More)
One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a risk that security policies are violated. To minimize this risk, cloud applications need to be engineered to adapt their security policies(More)
  • 1