Review Article
Comparison of Adaptive Information Security Approaches
Table 7
Approaches mapped to the adaptation loop.
| | (1) An architectural approach for self-managing security services | (2) A software framework for autonomic security in pervasive environments | (3) Context sensitive adaptive authentication | (4) Adaptive messaging middleware | (5) Adaptive security architecture based on EC-MQV algorithm in personal networks |
| Monitor | • | • | • | • | • | Analyse | | | • | • | • | Plan | • | | | | • | Execute | | | | | | Knowledge | | | | | |
|
|