SERENITY Aware Development of Security and Dependability Solutions

  • Daniel Serrano
  • Antonio Maña
  • Rafael Llarena
  • Beatriz Gallego-Nicasio Crespo
  • Keqin Li
Part of the Advances in Information Security book series (ADIS, volume 45)


This chapter presents an infrastructure supporting the implementation of Executable Components (ECs). ECs represent S&D solutions at the implementation level, that is, by means of pieces of executable code. ECs are instantiated by the Serenity runtime Framework (SRF) as a result of requests coming from applications. The development of ECs requires programmers having specific technical knowledge about SERENITY, since they need to implement certain interfaces of the ECs according to SERENITY standards. Every EC has to implement, the interface between the SRF and the EC itself, and the interface that the EC offers to applications.


Event Capturer Ambient Intelligence Dependability Solution Serenity Approach Java Implementation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Szyperski. C. (1998) Component software: beyond object-oriented programming. ACM Press/Addison-Wesley Publishing Co., 1998.Google Scholar
  2. 2.
    Vitharana P. Risks and challenges of component-based software development. Commun. ACM, 46:67–72, 2003.CrossRefGoogle Scholar
  3. 3.
    Edwards A. Heiser G. (2001) Components + security = os extensibility.Aust. Comput. Sci. Commun., 23:27–34, 2001.Google Scholar
  4. 4.
    Becker S, Canal C, Diakov N, Murillo J. M., Poizat P., Tivoli M. (2006) Coordination and adaptation techniques: Bridging the gap between design and implementation. In LNCS Springer, editor, Report on the ECOOP Workshop on Coordination and Adaptation Techniques for Software Entities (WCAT’06).Google Scholar
  5. 5.
    Schmidt D. C. Buschmann F. (2003) Patterns, frameworks, and middleware: their synergistic relationships. In ICSE ’03: Proceedings of the 25th International Conference on Software Engineering, pages 694–704, Washington, DC, USA, 2003. IEEE Computer Society.Google Scholar
  6. 6.
    Wilson G, Tharakan U. O. (2003) Unified security framework. pages 500–505, Dublin, Ireland, 2003. Trinity College Dublin.Google Scholar
  7. 7.
    Serrano D, Maña A, Soria-Rodrguez P, Piñuela P, Sotirious A. (2008) An architecture for secure ambient intelligence environments. In Proceedings of The 3rd Symposium of Ubiquitous Computing and Ambient Intelligence (ICAmI’08), Salamanca, November 2008. Springer-Verlag.Google Scholar
  8. 8.
    Antonio Maña, Antonio Muñoz, Francisco Sanchez-Cid, Daniel Serrano, Gimena Pujol Vivero, Antonio Botella, J. Salvador Torres, George Spanoudakis, Kelly Androutsopoulos, and Luca Compagna. (2008) Patterns and integration schemes languages (second version). Serenity Public Report A5.D2.3, 2008.Google Scholar

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  • Daniel Serrano
    • 1
  • Antonio Maña
    • 2
  • Rafael Llarena
    • 3
  • Beatriz Gallego-Nicasio Crespo
    • 4
  • Keqin Li
    • 5
  1. 1.Computer Science DepartmentUniversity of MalagaMalagaMálaga
  2. 2.Computer Science DepartmentUniversity of MalagaMalagaMálaga
  3. 3.Atos OriginAlbarracínMadrid
  4. 4.Atos OriginAlbarracínMadrid
  5. 5.SAP Research SRC Sophia AntipolisAvenue du Dr Maurice DonatMougins

Personalised recommendations