SERENITY in e-Business and Smart Item Scenarios

  • Azzedine Benameur
  • Paul El Khoury
  • Magali Seguran
  • Smriti Kumar Sinha
Part of the Advances in Information Security book series (ADIS, volume 45)


SERENITY Artefacts, like Class, Patterns, Implementations and Executable Components for Security & Dependability (S&D) in addition to Serenity Runtime Framework (SRF) are discussed in previous chapters. How to integrate these artefacts with applications in Serenity approach is discussed here with two scenarios. The e-Business scenario is a standard loan origination process in a bank. The Smart Item scenario is an Ambient intelligence case study where we take advantage of Smart Items to provide an electronic healthcare infrastructure for remote healthcare assistance. In both cases, we detail how the prototype implementations of the scenarios select proper executable components through Serenity Runtime Framework and then demonstrate how these executable components of the S&D Patterns are deployed.


Smart Home Trust Third Party Business Process Execution Language Serenity Approach Policy Decision Point 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Axis2 Web service Engine.
  2. 2.
    Rampart Axis2 Security Module.
  3. 3.
  4. 4.
  5. 5.
  6. 6.
    Pigot H, Mayers A, and Giroux S (2003) The intelligent habitat and everyday life activity support. In: Proceedings of the 5th international conference on Simulations in Biomedicine, Slovenia, 507-516.Google Scholar
  7. 7.
    Weiser M (1991) The computer for the twenty-first century, Scientific American, 265(2):94-104.CrossRefGoogle Scholar
  8. 8.
    Satyanarayanan M (2001) Pervasive computing: vision and challenges, 8(4):1017.Google Scholar
  9. 9.
    Remagnino P and Foresti G (2005) Ambient intelligence: A new multidisciplinary paradigm, IEEE Transactions on Systems, Man and Cybernetics, Part A, 35(1):16.CrossRefGoogle Scholar
  10. 10.
    European Parliament (1995) European directive 95/46/ce. Available: Directive.html. Accessed 1 December 2008
  11. 11.
    Sanchez-Cid E, Munoz A, Khoury P E and Compagna L (2007) XACML as a security and dependability pattern for access control in AmI environments. In: Proceedings of the Ambient Intelligence Developments Conf. (AmI.d'07), Springer.Google Scholar
  12. 12.
    Compagna L, Khoury P E, Massacci F, Thomas R and Zannone N (2007) How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. In ICAIL'07: Proceedings of the 11th international conference on Artificial intelligence and law. ACM Press, New York, NY, USA, 149-153.Google Scholar
  13. 13.
    Cuevas A, Khoury P E, Gomez L and Laube A (2008) Security patterns for capturing encryption-based access control to sensor data. The Second International Conference on Sensor Technologies and Applications, Secureware.Google Scholar
  14. 14.
    Khoury P E and Li K (2008) Serenity demo: Secure remote healthcare environment using serenity. EuroTrustAmI'08, System Engineering For Security and Dependability.Google Scholar
  15. 15.
    Khoury P E, Li K, Busnel P, Giroux S (2008) Serenity demo: Secure remote healthcare environment using serenity. Information Communication Technologies, Lyon France.Google Scholar
  16. 16.
    Khoury P E, Mokhtari A, Coquery E, Hacid M S (2008) An Ontological Interface for Software Developers to Select Security Patterns. The Second International Workshop on Secure systems methodologies using patterns, SPattern'08.Google Scholar
  17. 17.
    Busnel P, Khoury P E, Giroux S and Li K (2008) Achieving Socio-Technical Confidentiality using Security Pattern in Smart Homes, Third International Symposium on Smart Home.Google Scholar

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  • Azzedine Benameur
    • 1
  • Paul El Khoury
    • 2
  • Magali Seguran
    • 3
  • Smriti Kumar Sinha
    • 4
  1. 1.SAP ResearchSAP Labs FranceMouginsFrance
  2. 2.France University LyonMouginsFrance
  3. 3.SAP ResearchSAP Labs FranceMouginsFrance
  4. 4.SAP ResearchSAP Labs FranceMouginsFrance

Personalised recommendations