SERENITY Aware Development of Security and Dependability Solutions | SpringerLink
Skip to main content

SERENITY Aware Development of Security and Dependability Solutions

  • Chapter
  • First Online:
Security and Dependability for Ambient Intelligence

Part of the book series: Advances in Information Security ((ADIS,volume 45))

  • 375 Accesses

Abstract

This chapter presents an infrastructure supporting the implementation of Executable Components (ECs). ECs represent S&D solutions at the implementation level, that is, by means of pieces of executable code. ECs are instantiated by the Serenity runtime Framework (SRF) as a result of requests coming from applications. The development of ECs requires programmers having specific technical knowledge about SERENITY, since they need to implement certain interfaces of the ECs according to SERENITY standards. Every EC has to implement, the interface between the SRF and the EC itself, and the interface that the EC offers to applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Szyperski. C. (1998) Component software: beyond object-oriented programming. ACM Press/Addison-Wesley Publishing Co., 1998.

    Google Scholar 

  2. Vitharana P. Risks and challenges of component-based software development. Commun. ACM, 46:67–72, 2003.

    Article  Google Scholar 

  3. Edwards A. Heiser G. (2001) Components + security = os extensibility.Aust. Comput. Sci. Commun., 23:27–34, 2001.

    Google Scholar 

  4. Becker S, Canal C, Diakov N, Murillo J. M., Poizat P., Tivoli M. (2006) Coordination and adaptation techniques: Bridging the gap between design and implementation. In LNCS Springer, editor, Report on the ECOOP Workshop on Coordination and Adaptation Techniques for Software Entities (WCAT’06).

    Google Scholar 

  5. Schmidt D. C. Buschmann F. (2003) Patterns, frameworks, and middleware: their synergistic relationships. In ICSE ’03: Proceedings of the 25th International Conference on Software Engineering, pages 694–704, Washington, DC, USA, 2003. IEEE Computer Society.

    Google Scholar 

  6. Wilson G, Tharakan U. O. (2003) Unified security framework. pages 500–505, Dublin, Ireland, 2003. Trinity College Dublin.

    Google Scholar 

  7. Serrano D, Maña A, Soria-Rodrguez P, Piñuela P, Sotirious A. (2008) An architecture for secure ambient intelligence environments. In Proceedings of The 3rd Symposium of Ubiquitous Computing and Ambient Intelligence (ICAmI’08), Salamanca, November 2008. Springer-Verlag.

    Google Scholar 

  8. Antonio Maña, Antonio Muñoz, Francisco Sanchez-Cid, Daniel Serrano, Gimena Pujol Vivero, Antonio Botella, J. Salvador Torres, George Spanoudakis, Kelly Androutsopoulos, and Luca Compagna. (2008) Patterns and integration schemes languages (second version). Serenity Public Report A5.D2.3, 2008.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Serrano .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag US

About this chapter

Cite this chapter

Serrano, D., Maña, A., Llarena, R., Crespo, B.GN., Li, K. (2009). SERENITY Aware Development of Security and Dependability Solutions. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-88775-3_8

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-88774-6

  • Online ISBN: 978-0-387-88775-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics