Abstract
In this chapter we present an overview of the SERENITY approach. We describe the SERENITY model of secure and dependable applications and show how it addresses the challenge of developing, integrating and dynamically maintaining security and dependability mechanisms in open, dynamic, distributed and heterogeneous computing systems and in particular Ambient Intelligence scenarios. The chapter describes the basic concepts used in the approach and introduces the different processes supported by SERENITY, along with the tools provided.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Security Focus. The Largest Community of Security Professionals Available Anywhere. http://www.securityfocus.com/
Astalavista.com, One of the world's most popular and comprehensive computer security web sites http://www.astalavista.com/
Whittaker J, Thompson H (2003) How to Break Software Security, Addison Wesley.
Yoder J, Barcalow J (1997) Architectural patterns for enabling application security. PLoP '97
Schmidt DC (2003) Patterns, Frameworks and Middleware: Their Synergetic Relationships. Invited talk 25th Int. Conf. on Software Engineering (ICSE 2003).
Kienzle DM, Elder MC, Final Technical Report: Security Patterns for Web Application Development. http://www.scrypt.net/∼celer/securitypatterns/final%20report.pdf Accessed 21 December 2008
IBM's Security Strategy, (2004). Introduction to Business Security Patterns. An IBM White Paper. http://www-3.ibm.com/security/patterns/intro.pdf Accessed 21 December 2008
Konrad S, Cheng BHC, Campbell, Laura A, Wassermann R, (2003) Using Security Patterns to Model and Analyze Security Requirements. In Proc. of RHAS '03.
Yoder J, Barcalow J (2000) Architectural Patterns for Enabling Application Security. Pattern Languages of Program Design, 4:301–336, Addison Wesley.
Fernandez EB (2000) Metadata and authorization patterns. Tech. Rep., Florida Atlantic University
Romanosky S (2001) Security Design Patterns, Part 1, 1.4.
Fernandez EB, Pan R. (2001) A pattern language for security models. PLoP'01.
Torsten P, Fernandez EB, Mehlau JI, Pernul G (2004) A pattern system for access control. In Proc. 18th IFIP WG 11.3 Conference on Data and Applications Security.
Wassermann R, Cheng BHB (2003) Security patterns. Technical Report MSU-CSE-03-23, Computer Science and Engineering, Michigan State University.
Gamma E, Helm R, Johnson R, Vlissides J (1994) Design patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994
Delessy-Gassant N, Fernandez EB, Rajput S, Larrondo-Petrie MM, (2004) Patterns for Application Firewalls. PLoP'04.
Essmayr W, Pernul G, Tjoa AM, (1997). Access controls by object oriented concepts. In Proc. of 11th IFIP WG 11.3 Working Conference on Database Security.
Fernandez EB (2004) Two patterns for web services security. In Proc. Int. Symp. on Web Services and Applications (ISWS'04).
Mouratidis H, Giorgini P, Schumacher M (2003) Security Patterns for Agent Systems. In Proc. of 8th European Conference on Pattern Languages of Programs.
Hallstrom JO, Soundarajan N, Tyler B (2004) Monitoring Design Pattern Contracts. In Proc. of FSE-12 Work. on Specification and Verification of Component-Based Systems, 87–94.
Allenby K, Kelly T (2001) Deriving Requirements Using Scenarios. In Proc. of the 5th IEEE Int. Symposium on Requirements Engineering. RE'01.
Hallstrom J O., Soundarajan, N. (2006). “Pattern-Based System Evolution: A Case-Study”. In Proc of the 18t Int. Conference on Software Engineering and Knowledge Engineering.
Mikkonen T (1998) Formalizing design patterns. In Proc. Of 20th ICSE, 115–124.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Maña, A., Spanoudakis, G., Kokolakis, S. (2009). Introduction: The SERENITY vision. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_1
Download citation
DOI: https://doi.org/10.1007/978-0-387-88775-3_1
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-88774-6
Online ISBN: 978-0-387-88775-3
eBook Packages: Computer ScienceComputer Science (R0)