Abstract
This chapter presents an infrastructure supporting the implementation of Executable Components (ECs). ECs represent S&D solutions at the implementation level, that is, by means of pieces of executable code. ECs are instantiated by the Serenity runtime Framework (SRF) as a result of requests coming from applications. The development of ECs requires programmers having specific technical knowledge about SERENITY, since they need to implement certain interfaces of the ECs according to SERENITY standards. Every EC has to implement, the interface between the SRF and the EC itself, and the interface that the EC offers to applications.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Szyperski. C. (1998) Component software: beyond object-oriented programming. ACM Press/Addison-Wesley Publishing Co., 1998.
Vitharana P. Risks and challenges of component-based software development. Commun. ACM, 46:67–72, 2003.
Edwards A. Heiser G. (2001) Components + security = os extensibility.Aust. Comput. Sci. Commun., 23:27–34, 2001.
Becker S, Canal C, Diakov N, Murillo J. M., Poizat P., Tivoli M. (2006) Coordination and adaptation techniques: Bridging the gap between design and implementation. In LNCS Springer, editor, Report on the ECOOP Workshop on Coordination and Adaptation Techniques for Software Entities (WCAT’06).
Schmidt D. C. Buschmann F. (2003) Patterns, frameworks, and middleware: their synergistic relationships. In ICSE ’03: Proceedings of the 25th International Conference on Software Engineering, pages 694–704, Washington, DC, USA, 2003. IEEE Computer Society.
Wilson G, Tharakan U. O. (2003) Unified security framework. pages 500–505, Dublin, Ireland, 2003. Trinity College Dublin.
Serrano D, Maña A, Soria-Rodrguez P, Piñuela P, Sotirious A. (2008) An architecture for secure ambient intelligence environments. In Proceedings of The 3rd Symposium of Ubiquitous Computing and Ambient Intelligence (ICAmI’08), Salamanca, November 2008. Springer-Verlag.
Antonio Maña, Antonio Muñoz, Francisco Sanchez-Cid, Daniel Serrano, Gimena Pujol Vivero, Antonio Botella, J. Salvador Torres, George Spanoudakis, Kelly Androutsopoulos, and Luca Compagna. (2008) Patterns and integration schemes languages (second version). Serenity Public Report A5.D2.3, 2008.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Serrano, D., Maña, A., Llarena, R., Crespo, B.GN., Li, K. (2009). SERENITY Aware Development of Security and Dependability Solutions. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-88775-3_8
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-88774-6
Online ISBN: 978-0-387-88775-3
eBook Packages: Computer ScienceComputer Science (R0)