SERENITY in Air Traffic Management

  • Massimo Felici
  • Valentino Meduri
  • Alessandra Tedeschi
  • Carlo Riccucci
Part of the Advances in Information Security book series (ADIS, volume 45)


This chapter is concerned with the validation of an implementation of the SERENITY Runtime Framework (SRF) tailored for the Air Traffic Management (ATM) domain. It reports our experience in the design and validation phases of a tool, which relies on the SRF in order to support Security and Dependability (S&D) Patterns into work practices. In particular, this chapter pinpoints the activities concerning the identification of S&D Patterns, the design of an ATM prototype and its validation. The validation activities involve qualitative as well as quantitative approaches. These activities as a whole highlight the validation process for adopting S&D Patterns within the ATM domain. Moreover, they stress how S&D Patters enhance and relate to critical features within an industry domain. The empirical results point out that S&D Patterns relate to work practices. Furthermore, they highlight design and validation activities in order to tailor systems relying on S&D Patterns to specific application domains. This strengths and supports the adoption of S&D Patterns in order to address AmI (Ambient Intelligence) requirements (e.g., awareness, proactiveness, resilience, etc.) within the ATM domain.


Work Practice Situation Awareness Ambient Intelligence Evaluation Session Validation Activity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Asnar Y, Giorgini P, Massacci F, Saidane A, Bonato R, Meduri V, Riccucci C (2007) Secure and dependable patterns in organizations: An empirical approach. In: Proceedings of the IEEE 15th International Conference on Requirements Engineering, RE'07, IEEE Computer Society, pp 287-292Google Scholar
  2. 2.
    Avizienis A, Laprie JC, Randell B, Landwehr CE (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE TDSC 1(1):11-33Google Scholar
  3. 3.
    Bentley R, et al (1992) Ethnographically-Informed Systems Design for Air Traffic Control. In: Proceedings of CSCW, ACM, pp 123-129Google Scholar
  4. 4.
    EUROCONTROL (2007) European Operational Concept Validation Methodology (E-OCVM). EUROCONTROL, 2nd ednGoogle Scholar
  5. 5.
    Gamma E, et al (1995) Design Patters: Elements of Reusable Object-Oriented Software. Addison-WesleyGoogle Scholar
  6. 6.
    Giacomo VD, Felici M, Meduri V, Presenza D, Riccucci C, Tedeschi A (2008) Using security and dependability patterns for reaction processes. In: Proceedings of the 19th International Conference on Database and Expert Systems Application, DEXA '08, IEEE Computer Society, pp 315-319Google Scholar
  7. 7.
    Giorgini P, Massacci F, Mylopoulos J, Zannone N (2005) Modeling security requirements through ownership, permission and delegation. In: Proc. of RE'05, IEEE CS Press, pp 167-176Google Scholar
  8. 8.
    Halverson CA, Ackerman MS (2008) The Bird of an Organizational Resource: The Surprising Life of a Cheat Sheet. In: Ackerman MS, et al (eds) Resources, Co-Evolution and Artifacts, CSCW, Springer-Verlag, chap 1Google Scholar
  9. 9.
    Halverson CA, et al (1992) A Systems Approach to Design: Developing a Usable Automation Tool for Air Traffic Control. In: Proceedings of the IEEE/AIAA 11th Conference on Digital Avionics Systems, pp 167-173Google Scholar
  10. 10.
    ICAO (2005) Global Air Traffic Management Operational Concept. International Civil Aviation Organization (ICAO)Google Scholar
  11. 11.
    ISTAG (2002) Trust, dependability, security and privacy for IST in FP6. ISTAG - IST Advisory GroupGoogle Scholar
  12. 12.
    ISTAG (2003) Ambient Intelligence: from vision to reality. ISTAG - IST Advisory GroupGoogle Scholar
  13. 13.
    Lanzi P, Marti P, Pozzi S, Scrivani P (2004) Users as cultural mediators in interactive system design. In: Reed D, Baxter G, Blythe M (eds) Living and Working with Technology, Proceedings of the twelfth European conference on cognitive ergonomics, ECCE12Google Scholar
  14. 14.
    Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting. In: Proc. of RE'03, pp 151-161Google Scholar
  15. 15.
    Marti P, Scrivani P (2003) The representation of context in the simulation of complex systems. Cognitive Technologies Journal 8(1):32-42Google Scholar
  16. 16.
    Marti P, Lanzi P, Pucci F (2001) Evaluating safety and usability of atm systems. In: Proceedings of the 4th International seminar on ATM R&D, FAA and EurocontrolGoogle Scholar
  17. 17.
    Martin D, Sommerville I (2004) Patterns of cooperative interaction: Linking ethnomethodology and design. ACM Transactions on Computer-Human Interaction 11(1):59-89CrossRefGoogle Scholar
  18. 18.
    Maulsby D, Greenberg S, Mander R (1993) Prototyping an Intelligent Agent through Wizard of Oz. In: Proceedings of INTERCHI'93, ACM, pp 277-284Google Scholar
  19. 19.
    Saidane A (2007) Serenity: A generic framework for dependability construction - a patterns oriented approach. In: Butler M, Jones CB, Romanovsky A, Troubitsyna E (eds) Proceedings of the Workshop on Methods, Models and Tools for Fault Tolerance, School of Computing Science, University of Newcastle upon Tyne, no. CS-TR-1032 in Technical Report Series, pp 111-117Google Scholar
  20. 20.
    Schmidt D (2000) Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked Objects, vol 2. John Wiley & SonsGoogle Scholar
  21. 21.
    Schumacher M, et al (2006) Security Patterns: Integrating Security and Systems Engineering. John Wiley & SonsGoogle Scholar
  22. 22.
    Shalloway A, Trott JR (2005) Design Patterns: A New Perspective on Object-Oriented Design, 2nd edn. Addison-WesleyGoogle Scholar
  23. 23.
    Sheridan TB (2002) Humans and Automation: System Design and Research Issues. WileyGoogle Scholar

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  • Massimo Felici
    • 1
  • Valentino Meduri
    • 2
  • Alessandra Tedeschi
    • 3
  • Carlo Riccucci
    • 4
  1. 1.Piazza Buenos AiresRomaItaly
  2. 2.Piazza Buenos AiresRomaItaly
  3. 3.Piazza Buenos AiresRomaItaly
  4. 4.Engineering Ingegneria Informatica S.p.A., R&D LaboratoryRomaItaly

Personalised recommendations