lution to the scheduling test which is based on the sys-
tem adaptation to guarantee the correct functioning of
the system with the integrated patterns.
Our future work, we focus on two main areas. One
is the extension of the requirement ontology. The
other area is the Automatic benchmark integration in
the real-time system model; one takes into consider-
ation the other criteria that perform to system perfor-
mance such as runtime and energy.
REFERENCES
Alam, M., Breu, R., and Hafner, M. (2007). Model-driven
security engineering for trust management in sectet.
JSW, 2(1):47–59.
Bouaziz, R., Krichen, F., and Coulette, B. (2015). C-scrip:
collaborative security pattern integration process. In-
ternational Journal of Information Technology and
Web Engineering (IJITWE), 10(1):31–46.
Denker, G., Kagal, L., and Finin, T. (2005). Security in the
semantic web using owl. Information Security Tech-
nical Report, 10(1):51–58.
Dobson, S., Denazis, S., Fern
´
andez, A., Ga
¨
ıti, D., Gelenbe,
E., Massacci, F., Nixon, P., Saffre, F., Schmidt, N.,
and Zambonelli, F. (2006). A survey of autonomic
communications. ACM Transactions on Autonomous
and Adaptive Systems (TAAS), 1(2):223–259.
Fernandez, E. B., Ballesteros, J., Desouza-Doucet, A. C.,
and Larrondo-Petrie, M. M. (2007a). Security pat-
terns for physical access control systems. In IFIP An-
nual Conference on Data and Applications Security
and Privacy, pages 259–274. Springer.
Fernandez, E. B., Pelaez, J. C., and Larrondo-Petrie, M. M.
(2007b). Security patterns for voice over ip networks.
In Computing in the Global Information Technology,
2007. ICCGI 2007. International Multi-Conference
on, pages 33–33. IEEE.
Gamma, E. (1995). Design patterns: elements of reusable
object-oriented software. Pearson Education India.
Guan, H., Yang, H., and Wang, J. (2016). An ontology-
based approach to security pattern selection. In-
ternational Journal of Automation and Computing,
13(2):168–182.
Motii, A., Hamid, B., Lanusse, A., and Bruel, J.-M. (2015).
Guiding the selection of security patterns based on se-
curity requirements and pattern classification. In Pro-
ceedings of the 20th European Conference on Pattern
Languages of Programs, page 10. ACM.
Motii, A., Hamid, B., Lanusse, A., and Bruel, J.-M. (2016).
Guiding the selection of security patterns for real-time
systems. In Engineering of Complex Computer Sys-
tems (ICECCS), 2016 21st International Conference
on, pages 155–164. IEEE.
OMG (2008). Object management group. a uml profile for
marte: Modeling and analysis of real-time embedded
systems. In Beta2, Object Management Group.
Said, M. B., Kacem, Y. H., Kerboeuf, M., Amor, N. B., and
Abid, M. (2014). Design patterns for self-adaptive rte
systems specification. International Journal of Recon-
figurable Computing, 2014:8.
Schumacher, M. (2003). Security engineering with pat-
terns: origins, theoretical models, and new applica-
tions, volume 2754. Springer Science & Business Me-
dia.
Souag, A., Salinesi, C., Mazo, R., and Comyn-Wattiau,
I. (2015). A security ontology for security require-
ments elicitation. In International symposium on engi-
neering secure software and systems, pages 157–177.
Springer.
Toahchoodee, M., Abdunabi, R., Ray, I., and Ray, I. (2009).
A trust-based access control model for pervasive com-
puting applications. In IFIP Annual Conference on
Data and Applications Security and Privacy, pages
307–314. Springer.
Yousef, A. and Khaled, S. (2015). The impact of architec-
tural styles on self adaptive systems engineering. The
Impact of Architectural Styles on Self Adaptive Sys-
tems Engineering.
Safe Design Real-time Embedded Systems with Security Patterns
463