Introduction: The SERENITY vision

In this chapter we present an overview of the SERENITY approach. We describe the SERENITY model of secure and dependable applications and show how it addresses the challenge of developing, integrating and dynamically maintaining security and dependability mechanisms in open, dynamic, distributed and heterogeneous computing systems and in particular Ambient Intelligence scenarios. The chapter describes the basic concepts used in the approach and introduces the different processes supported by SERENITY, along with the tools provided.

[1]  Marius Iulian Mihailescu,et al.  Security Design Patterns , 2010 .

[2]  Neelam Soundarajan,et al.  Monitoring Design Pattern Contracts , 2004 .

[3]  James A. Whittaker,et al.  How to Break Software Security , 2003 .

[4]  Douglas C. Schmidt,et al.  Patterns, frameworks, and middleware: their synergistic relationships , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..

[5]  Tommi Mikkonen,et al.  Formalizing design patterns , 1998, Proceedings of the 20th International Conference on Software Engineering.

[6]  Eduardo B. Fernández,et al.  Two Patterns for Web Services Security , 2004, International Conference on Internet Computing.

[7]  Eduardo B. Fernandez,et al.  Metadata and authorization patterns , 2000 .

[8]  A Min Tjoa,et al.  Access Controls by Object-Oriented Concepts , 1997, DBSec.

[9]  Eduardo B. Fernández,et al.  A Pattern System for Access Control , 2004, DBSec.

[10]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[11]  Eduardo B. Fernandez,et al.  A pattern language for security models , 2001 .

[12]  Joseph W. Yoder,et al.  Architectural Patterns for Enabling Application Security , 1998 .

[13]  Neelam Soundarajan,et al.  Pattern-Based System Evolution: A Case-Study , 2006, SEKE.

[14]  Tim Kelly,et al.  Deriving safety requirements using scenarios , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.

[15]  Haralambos Mouratidis,et al.  Security Patterns for Agent Systems , 2003 .