SECURITY PATTERNS, TOWARDS A FURTHER LEVEL

Beatriz Gallego-Nicasio, Antonio Muñoz, Antonio Maña, Daniel Serrano

2009

Abstract

Traditionally, security patterns have successfully been used to describe security and dependability (S\&D) solutions, making them available to system engineers not being security experts. Recently, in the SERENITY research project, the notion of S\&D pattern was extended to exact specifications of re-usable S\&D mechanisms for Ambient Intelligence (AmI) systems. SERENITY is focused in AmI systems, but its results can be applied to other computer paradigms: grids, distributed computing, etc. SERENITY S\&D patterns include information about both the S\&D properties that the solution satisfies and the requirements on the context conditions. Along this paper, we describe how abstract S\&D solutions can be implemented by means of functional S\&D services. In order to do that, our approach is based on the use of SERENITY S\&D patterns, and their implementations, called ExecutableComponents. Finally, we propose several examples and we prove their potential application to AmI scenarios.

References

  1. Becker, S., Canal, C., Diakov, N., Murillo, J., Poizat, P., and Tivoli, M. (2007). Coordination and adaptation techniques: Bridging the gap between design and implementation. In Springer, L., editor, Report on the ECOOP Workshop on Coordination and Adaptation Techniques for Software Entities (WCAT'06).
  2. Georgiadis, I., Magee, J., and Kramer, J. (2002). Selforganising software architectures for distributed systems. In WOSS 7802: Proc. workshop on Self-healing systems, pages 33-38, New York, NY, USA. ACM.
  3. Jaeger, T., Liedtke, J., Pantellenko, V., Park, Y., and Islam, N. (1998). Security architecture for component-based operating system. In ACM, editor, In ACM Special Interest Group in Operating Systems (SIGOPS) European Workshop., page 118.
  4. Kung, A. (2007). Architecture and design patterns for ambient intelligence: an industry perspective. In Proc. of AmID 2007, volume ISBN: 978-2-287-78543-6, pages 55-67, Sophia-antipolis (France). SpringerVerlag.
  5. Mana, A., Sánchez, F., Serrano, D., and Munoz, A. (2006). Building secure ambient intelligence scenarios. In 18th conf. on Software Engineering and Knowledge Engineering (SEKE'06).
  6. Mei, L. and Xu, Y. (2003). An adaptive dependability model of component-based software. In ACM, editor, ACM SIGSOFT Software Engineering Notes, volume 28.
  7. Nobukazu, Y., Shinichi, H., and Anthony, F. (2004). Security patterns: A method for constructing secure and efficient inter-company coordination systems. In International, E. I., editor, Enterprise Distributed Object Computing Conference, pages 84-97. IEEE Computer Society Press.
  8. Schmidt, D. C. and Buschmann, F. (2003). Patterns, frameworks, and middleware: their synergistic relationships. In ICSE 7803., pages 694-704, Washington, DC, USA. IEEE Computer Society.
Download


Paper Citation


in Harvard Style

Gallego-Nicasio B., Muñoz A., Maña A. and Serrano D. (2009). SECURITY PATTERNS, TOWARDS A FURTHER LEVEL . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 349-356. DOI: 10.5220/0002230303490356


in Bibtex Style

@conference{secrypt09,
author={Beatriz Gallego-Nicasio and Antonio Muñoz and Antonio Maña and Daniel Serrano},
title={SECURITY PATTERNS, TOWARDS A FURTHER LEVEL},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={349-356},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002230303490356},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - SECURITY PATTERNS, TOWARDS A FURTHER LEVEL
SN - 978-989-674-005-4
AU - Gallego-Nicasio B.
AU - Muñoz A.
AU - Maña A.
AU - Serrano D.
PY - 2009
SP - 349
EP - 356
DO - 10.5220/0002230303490356