International Scholarly Research Notices / 2013 / Article / Tab 7

Review Article

Comparison of Adaptive Information Security Approaches

Table 7

Approaches mapped to the adaptation loop.

(1) An architectural approach for self-managing security services(2) A software framework for autonomic security in pervasive environments(3) Context sensitive adaptive authentication(4) Adaptive messaging middleware(5) Adaptive security architecture based on EC-MQV algorithm in personal networks

Monitor
Analyse
Plan
Execute
Knowledge

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.