Abstract
Traditionally, security patterns have successfully been used to describe security and dependability. In the SERENITY Project the notion of security and dependability (S&D) pattern has been extended to exact specifications of re-usable security mechanisms for Ambient Intelligence (AmI) systems. These S&D Patterns include information on the security properties satisfied by the solution and on the context conditions to be fulfilled. This chapter presents the development of applications supported by SERENITY. In the context of SERENITY we refer to these applications as Serenity-aware applications. Firstly, this chapter presents the Serenity-aware application design using S&D Artefacts. Secondly, it proposes a Java Application Programming Interface (API) to be used in the application development. And, finally, it introduces the development of an example Serenity-aware application.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Lodderstedt T, Basin D, Doser J. (2002) Secureuml: A uml-based modeling language for model-driven security. In UML '02: Proceedings of the 5th International Conference on The Unified Modeling Language, pages 426–441, London, UK. Springer-Verlag.
Best B, Jurjens J, Nuseibeh B. (2007) Model-based security engineering of distributed information systems using umlsec.In ICSE '07: Proceedings of the 29th International Conference on Software Engineering, pages 581–590, Washington, DC, USA. IEEE Computer Society.
Lacoste G. (2000) Semper-Secure Electronic Marketplace for Europe. Springer-Verlag New York, Inc., Secaucus, NJ, USA.
Röhm A. W. (1999) Cops: A model and infrastructure for secure and fair electronic markets. In HICSS '99: Proceedings of the Thirty-second Annual Hawaii International Conference on System Sciences-Volume 8, page 8021, Washington, DC, USA. IEEE Computer Society.
Aagedal J. O, den Braber F, Dimitrakos T, Gran B, Raptis D, Stölen K. (2002) Model-based risk assessment to improve enterprise security. In EDOC '02: Proceedings of the Sixth International ENTERPRISE DISTRIBUTED OBJECT COMPUTING Conference (EDOC'02), page 51, Washington, DC, USA. IEEE Computer Society.
Basin D, Doser J, Lodderstedt T. (2003) Model driven security for process-oriented systems. In em SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, pages 100–109, New York, NY, USA. ACM.
Schumacher M. (2003) Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. Springer-Verlag New York, Inc., Secaucus, NJ, USA.
The Open Group. (2004) Security Design Patterns (SDP) technical guide. The Open Group.
Konrad S, Cheng B, Campbell L, Wassermann R. (2003) Using security patterns to model and analyze security requirements. In Proceedings of the Requirements for High Assurance Systems Workshop (RHAS03) as part of the IEEE Joint International Conference on Requirements Engineering (RE03), Monterey Bay, CA, USA.
Greenfield J, Short K, Cook S, Kent S, Crupi J. Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools. Wiley.
Szyperski C. (1998) Component software: beyond object-oriented programming. ACM Press/Addison-Wesley Publishing Co.
ISO/IEC. Unified Modeling Language (UML). version 1.4.2. international standard iso/iec 19501.
Bresciani P, Giorgini P, Giunchiglia F, Mylopoulos J, Perini A. (2004) Tropos: An agent-oriented software development methodology. journal of autonomous agents and multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems. 8:203–236.
Fuentes-Fernández L, Vallecillo-Moreno A. (2004) An introduction to uml profiles. The European Journal for the Informatics Professional, 5(2).
A. Maña, A. Muñoz, F. Sánchez-Cid, D. Serrano, G. Pujol, S. Torres, S. Gergens, C. Rudolph, A. Saidane, F. Dalpiaz, F. Massacci, and P. Soria Rodriguez. (2007) Security properties specification language. Serenity Public Report A5.D3.1.
ISO/IEC. Ebnf notation. international standard iso/iec 14977:1996(e).
P. El Khoury, B. Gallego-Nicasio, S. Kumar Sinha, K. Li, A. Maña, A. Muñoz, J.F. Ruiz, A. Saidane, and D. Serrano. (2008) End-user requirements specification language (initial version). Serenity Public Report A5.D4.1.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Serrano, D., Maña, A., Llarena, R., Crespo, B.GN., Li, K. (2009). SERENITY Aware System Development Process. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_10
Download citation
DOI: https://doi.org/10.1007/978-0-387-88775-3_10
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-88774-6
Online ISBN: 978-0-387-88775-3
eBook Packages: Computer ScienceComputer Science (R0)