scriptor. Then, the application will be able to continue
accessing the services provided by the S&D Solution
with no damage.
8 CONCLUSIONS
This work presents an approach for producing secure
applications by means of a provision of S&D solu-
tions. This approach, called Serenity, is composed
by two frameworks. On the one hand, the Serenity
Development-time Framework (SDF) includes con-
cepts, processes and tools supporting the development
of S&D solutions, and secure applications. These
S&D solutions are implemented by means of four
S&D artefacts: (i) S&DClasses, (ii) S&DPatterns,
(iii) S&DImplementations, and (iv) S&D Executable-
Components. This hierarchy enables the use of
security and dependability (S&D) patterns imple-
mentations to develop secure applications. These
S&DPatterns are not a simple set of best practices
or recommendations, like those proposed in the lit-
erature as security patterns, but precise, well-defined
and automated-processing-enabled implementations
of security mechanisms. The extensive use of seman-
tic descriptions, enable the use of automated reason-
ing mechanisms capable of solving problems such as
pattern composition and adaptation. Thus, we have
presented an infrastructure for supporting both the de-
velopment of ExecutableComponents and Serenity-
aware applications. On the other hand, the Serenity
Run-time Framework (SRF) completes the open soft-
ware architectures designed using the SDF, by sup-
porting applications when they requires the use of se-
curity solutions at run-time. It is important to high-
light that the SRF includes monitoring mechanisms
that guarantee that selected S&D solutions are run-
ning properly. In this paper we have presented both
the SDF main concepts and the SRF architecture. Fur-
thermore, we have provided the description of full
developed demo scenario. To deploy this scenario
a set of S&D artefacts has been developed. These
artefacts are used to provide several secure measure-
ment and authentication security patterns, all of them
represented at different abstractions levels, ranging
from the most abstract representation of the solution
(S&DClass), to the real implementation of the pattern
(ExecutableComponent). Among the more relevant
features of this approach is the selection of patterns at
runtime, as well as the configuration of them. Indeed,
this allows context awareness while running obtain-
ing exceptional results. Currently, we count on a fully
operational prototype of the SRF and on XML based
languages for the creation of all S&D artefacts. Be-
sides, we have developed two APIs, one for the imple-
mentation of ExecutableComponents, and the other
one oriented to the implementation of serenity sup-
ported applications (Serenity-aware applications). Fi-
nally, we count on an on-line repository and a useful
tool to search for S&D artefacts. These elements have
been the basis to develop a first set of S&D solutions.
Next steps are (i) to improve the capacities of the SRF
prototype with more reaction capabilities, (ii) to cre-
ate a plugging for include design concepts in a Java
IDE, and (iii) to provide a new version of the APIs for
taking the new advantages that will be introduced in
the next SRF prototype.
REFERENCES
Becker, S., Canal, C., Diakov, N., Murillo, J., Poizat, P.,
and Tivoli, M. (2007). Coordination and adaptation
techniques: Bridging the gap between design and im-
plementation. In Springer, L., editor, Report on the
ECOOP Workshop on Coordination and Adaptation
Techniques for Software Entities (WCAT’06).
Georgiadis, I., Magee, J., and Kramer, J. (2002). Self-
organising software architectures for distributed sys-
tems. In WOSS ’02: Proc. workshop on Self-healing
systems, pages 33–38, New York, NY, USA. ACM.
Jaeger, T., Liedtke, J., Pantellenko, V., Park, Y., and Islam,
N. (1998). Security architecture for component-based
operating system. In ACM, editor, In ACM Special
Interest Group in Operating Systems (SIGOPS) Euro-
pean Workshop., page 118.
Kung, A. (2007). Architecture and design patterns for am-
bient intelligence: an industry perspective. In Proc.
of AmID 2007, volume ISBN: 978-2-287-78543-6,
pages 55–67, Sophia-antipolis (France). Springer-
Verlag.
Mana, A., S
´
anchez, F., Serrano, D., and Munoz, A. (2006).
Building secure ambient intelligence scenarios. In
18th conf. on Software Engineering and Knowledge
Engineering (SEKE’06).
Mei, L. and Xu, Y. (2003). An adaptive dependability model
of component-based software. In ACM, editor, ACM
SIGSOFT Software Engineering Notes, volume 28.
Nobukazu, Y., Shinichi, H., and Anthony, F. (2004). Se-
curity patterns: A method for constructing secure and
efficient inter-company coordination systems. In In-
ternational, E. I., editor, Enterprise Distributed Object
Computing Conference, pages 84–97. IEEE Computer
Society Press.
Schmidt, D. C. and Buschmann, F. (2003). Patterns, frame-
works, and middleware: their synergistic relation-
ships. In ICSE ’03., pages 694–704, Washington, DC,
USA. IEEE Computer Society.
SECRYPT 2009 - International Conference on Security and Cryptography
356