SERENITY Aware Development of Security and Dependability Solutions
This chapter presents an infrastructure supporting the implementation of Executable Components (ECs). ECs represent S&D solutions at the implementation level, that is, by means of pieces of executable code. ECs are instantiated by the Serenity runtime Framework (SRF) as a result of requests coming from applications. The development of ECs requires programmers having specific technical knowledge about SERENITY, since they need to implement certain interfaces of the ECs according to SERENITY standards. Every EC has to implement, the interface between the SRF and the EC itself, and the interface that the EC offers to applications.
KeywordsEvent Capturer Ambient Intelligence Dependability Solution Serenity Approach Java Implementation
Unable to display preview. Download preview PDF.
- 1.Szyperski. C. (1998) Component software: beyond object-oriented programming. ACM Press/Addison-Wesley Publishing Co., 1998.Google Scholar
- 3.Edwards A. Heiser G. (2001) Components + security = os extensibility.Aust. Comput. Sci. Commun., 23:27–34, 2001.Google Scholar
- 4.Becker S, Canal C, Diakov N, Murillo J. M., Poizat P., Tivoli M. (2006) Coordination and adaptation techniques: Bridging the gap between design and implementation. In LNCS Springer, editor, Report on the ECOOP Workshop on Coordination and Adaptation Techniques for Software Entities (WCAT’06).Google Scholar
- 5.Schmidt D. C. Buschmann F. (2003) Patterns, frameworks, and middleware: their synergistic relationships. In ICSE ’03: Proceedings of the 25th International Conference on Software Engineering, pages 694–704, Washington, DC, USA, 2003. IEEE Computer Society.Google Scholar
- 6.Wilson G, Tharakan U. O. (2003) Unified security framework. pages 500–505, Dublin, Ireland, 2003. Trinity College Dublin.Google Scholar
- 7.Serrano D, Maña A, Soria-Rodrguez P, Piñuela P, Sotirious A. (2008) An architecture for secure ambient intelligence environments. In Proceedings of The 3rd Symposium of Ubiquitous Computing and Ambient Intelligence (ICAmI’08), Salamanca, November 2008. Springer-Verlag.Google Scholar
- 8.Antonio Maña, Antonio Muñoz, Francisco Sanchez-Cid, Daniel Serrano, Gimena Pujol Vivero, Antonio Botella, J. Salvador Torres, George Spanoudakis, Kelly Androutsopoulos, and Luca Compagna. (2008) Patterns and integration schemes languages (second version). Serenity Public Report A5.D2.3, 2008.Google Scholar