SECURITY PATTERNS, TOWARDS A FURTHER LEVEL
Beatriz Gallego-Nicasio, Antonio Muñoz, Antonio Maña, Daniel Serrano
2009
Abstract
Traditionally, security patterns have successfully been used to describe security and dependability (S\&D) solutions, making them available to system engineers not being security experts. Recently, in the SERENITY research project, the notion of S\&D pattern was extended to exact specifications of re-usable S\&D mechanisms for Ambient Intelligence (AmI) systems. SERENITY is focused in AmI systems, but its results can be applied to other computer paradigms: grids, distributed computing, etc. SERENITY S\&D patterns include information about both the S\&D properties that the solution satisfies and the requirements on the context conditions. Along this paper, we describe how abstract S\&D solutions can be implemented by means of functional S\&D services. In order to do that, our approach is based on the use of SERENITY S\&D patterns, and their implementations, called ExecutableComponents. Finally, we propose several examples and we prove their potential application to AmI scenarios.
References
- Becker, S., Canal, C., Diakov, N., Murillo, J., Poizat, P., and Tivoli, M. (2007). Coordination and adaptation techniques: Bridging the gap between design and implementation. In Springer, L., editor, Report on the ECOOP Workshop on Coordination and Adaptation Techniques for Software Entities (WCAT'06).
- Georgiadis, I., Magee, J., and Kramer, J. (2002). Selforganising software architectures for distributed systems. In WOSS 7802: Proc. workshop on Self-healing systems, pages 33-38, New York, NY, USA. ACM.
- Jaeger, T., Liedtke, J., Pantellenko, V., Park, Y., and Islam, N. (1998). Security architecture for component-based operating system. In ACM, editor, In ACM Special Interest Group in Operating Systems (SIGOPS) European Workshop., page 118.
- Kung, A. (2007). Architecture and design patterns for ambient intelligence: an industry perspective. In Proc. of AmID 2007, volume ISBN: 978-2-287-78543-6, pages 55-67, Sophia-antipolis (France). SpringerVerlag.
- Mana, A., Sánchez, F., Serrano, D., and Munoz, A. (2006). Building secure ambient intelligence scenarios. In 18th conf. on Software Engineering and Knowledge Engineering (SEKE'06).
- Mei, L. and Xu, Y. (2003). An adaptive dependability model of component-based software. In ACM, editor, ACM SIGSOFT Software Engineering Notes, volume 28.
- Nobukazu, Y., Shinichi, H., and Anthony, F. (2004). Security patterns: A method for constructing secure and efficient inter-company coordination systems. In International, E. I., editor, Enterprise Distributed Object Computing Conference, pages 84-97. IEEE Computer Society Press.
- Schmidt, D. C. and Buschmann, F. (2003). Patterns, frameworks, and middleware: their synergistic relationships. In ICSE 7803., pages 694-704, Washington, DC, USA. IEEE Computer Society.
Paper Citation
in Harvard Style
Gallego-Nicasio B., Muñoz A., Maña A. and Serrano D. (2009). SECURITY PATTERNS, TOWARDS A FURTHER LEVEL . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 349-356. DOI: 10.5220/0002230303490356
in Bibtex Style
@conference{secrypt09,
author={Beatriz Gallego-Nicasio and Antonio Muñoz and Antonio Maña and Daniel Serrano},
title={SECURITY PATTERNS, TOWARDS A FURTHER LEVEL},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={349-356},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002230303490356},
isbn={978-989-674-005-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - SECURITY PATTERNS, TOWARDS A FURTHER LEVEL
SN - 978-989-674-005-4
AU - Gallego-Nicasio B.
AU - Muñoz A.
AU - Maña A.
AU - Serrano D.
PY - 2009
SP - 349
EP - 356
DO - 10.5220/0002230303490356