SERENITY in e-Business and Smart Item Scenarios

SERENITY Artefacts, like Class, Patterns, Implementations and Executable Components for Security & Dependability (S&D) in addition to Serenity Runtime Framework (SRF) are discussed in previous chapters. How to integrate these artefacts with applications in Serenity approach is discussed here with two scenarios. The e-Business scenario is a standard loan origination process in a bank. The Smart Item scenario is an Ambient intelligence case study where we take advantage of Smart Items to provide an electronic healthcare infrastructure for remote healthcare assistance. In both cases, we detail how the prototype implementations of the scenarios select proper executable components through Serenity Runtime Framework and then demonstrate how these executable components of the S&D Patterns are deployed.

[1]  Mark Weiser The computer for the 21st century , 1991 .

[2]  Luca Compagna,et al.  XACML as a Security and Dependability Pattern for Access Control in AmI environments , 2008 .

[3]  Ernesto Damiani,et al.  Web Service Security , 2011, Encyclopedia of Cryptography and Security.

[4]  Annett Laube,et al.  Security Patterns for Capturing Encryption-Based Access Control to Sensor Data , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[5]  Emmanuel Coquery,et al.  An Ontological Interface for Software Developers to Select Security Patterns , 2008, 2008 19th International Workshop on Database and Expert Systems Applications.

[6]  Fabio Massacci,et al.  How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach , 2007, ICAIL.

[7]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[8]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[9]  S. Giroux,et al.  The Intelligent Habitat And Everyday Life Activity Support , 2003 .

[10]  Gian Luca Foresti,et al.  Ambient Intelligence: A New Multidisciplinary Paradigm , 2005 .

[11]  Sylvain Giroux,et al.  Achieving Socio-technical Confidentiality Using Security Pattern in Smart Homes , 2008, 2008 Second International Conference on Future Generation Communication and Networking.