City Research Online

Towards security monitoring patterns

Spanoudakis, G., Kloukinas, C. and Androutsopoulos, K. (2007). Towards security monitoring patterns. Paper presented at the 22nd Annual ACM Symposium on Applied Computing, 11 - 15 March 2007, Seoul, Korea.


Runtime monitoring is performed during system execution to detect whether the system’s behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be monitored in event calculus – a formal temporal first order language. Following an investigation of how this framework could be used to monitor security requirements, in this paper we propose patterns for expressing three basic types of such requirements, namely confidentiality, integrity and availability. These patterns aim to ease the task of specifying confidentiality, integrity and availability requirements in monitorable forms by non-expert users. The paper illustrates the use of these patterns using examples of an industrial case study.

Publication Type: Conference or Workshop Item (Paper)
Publisher Keywords: runtime monitoring, security patterns, event calculus
Subjects: Q Science > QA Mathematics > QA76 Computer software
Departments: School of Mathematics, Computer Science & Engineering > Computer Science > Software Reliability
Date available in CRO: 28 Nov 2012 13:36
Date of first online publication: 2007
Download (146kB) | Preview



Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login