Developing Ambient Intelligence
DOI: 10.1007/978-2-287-47610-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Software Engineering Techniques Applied to AmI: Security Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…In this paper, we described the monitoring-related aspects of a framework [2] that supports the dynamic configuration, adaptation and monitoring of systems that need to guarantee specific security and dependability properties whilst operating in distributed settings. The framework is based on patterns [4] providing specifications of implementation solutions that can be used by systems in order to achieve specific security and dependability properties.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, we described the monitoring-related aspects of a framework [2] that supports the dynamic configuration, adaptation and monitoring of systems that need to guarantee specific security and dependability properties whilst operating in distributed settings. The framework is based on patterns [4] providing specifications of implementation solutions that can be used by systems in order to achieve specific security and dependability properties.…”
Section: Discussionmentioning
confidence: 99%
“…The objective of the framework that we present in this paper is two-fold: (a) to provide runtime support to external systems for the realisation of specific S&D properties, presented in more detail in [2], and (b) to monitor the effectiveness and adequacy of the support that it provides in specific operational contexts. The approach that we advocate for (b) is related to security monitoring systems, which can be distinguished into firewalls and intrusion detection systems [8,9], intrusion prevention systems [10,11], and access control systems [12,13].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Security patterns have successfully been used to describe security solutions in a way that these solutions are made available to system engineers not being experts on security engineering [1,2,5,6,7,8,10]. Such security patterns are usually informally described using either plain text or use semi-formal languages enhanced with graphical visualisations.…”
Section: Introductionmentioning
confidence: 99%
“…The European research project SERENITY 1 tries to contribute to the realisation of this vision by developing an approach to construct AmI ecosystems that are both secure and dependable. The SERENITY effort proposes an architecture to construct design and run-time frameworks for AmI [2].…”
mentioning
confidence: 99%