Review Article

Comparison of Adaptive Information Security Approaches

Table 7

Approaches mapped to the adaptation loop.

(1) An architectural approach for self-managing security services(2) A software framework for autonomic security in pervasive environments(3) Context sensitive adaptive authentication(4) Adaptive messaging middleware(5) Adaptive security architecture based on EC-MQV algorithm in personal networks

Monitor
Analyse
Plan
Execute
Knowledge