Beschreibung
InhaltsangabePreface.- Introduction.- Security and Dependability in Ambient Intelligence (AmI).- Security and Dependability Engineering.- The Use of Patterns in Security and Dependability Engineering: An Overview.- The SERENITY vision.- Realising the Vision Specification of S&D Properties.- Representation of Security and Dependability Solutions.- Organisational Level S&D Patterns.- S&D patterns for Web Services and Workflows.- Network and Communication S&D Patterns.- Pattern Integration Schemes.- SERENITY S&D Solution Development Process.- SERENITY Trust Model.- Verification Using the Secure Tropos Approach.- Verification Using APA-SHVT.- Verification Using Avispa.- Complementing Solutions with Monitoring.- Transforming Verification Results into Models.- Exploiting S&D Patterns in System Development.- SERENITY System Development Process.- Pattern Libraries and their Use System Development.- Exploiting S&D Patterns at Runtime.- The SERENITY Framework.- Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime.- Pattern Driven Detection of S&D Intrusions and Threats.- Diagnosing S&D Iintrusions.- Recovery and Control for S&D Intrusions and Threats.- Supporting the Evolution of S&D Patterns.- Experiences and Future Directions.- Applications of SERENITY Framework on Industrial Case Studies - Experiences and Challenges.- Standardization.- Realizing the Potential of SERENITY in Emerging AmI Ecosystems: Implications and Challenges.- Index.
Inhaltsverzeichnis
Preface.- Introduction.- Security and Dependability in Ambient Intelligence (AmI).- Security and Dependability Engineering.- The Use of Patterns in Security and Dependability Engineering: An Overview.- The SERENITY vision.- Realising the Vision Specification of S&D Properties.- Representation of Security and Dependability Solutions.- Organisational Level S&D Patterns.- S&D patterns for Web Services and Workflows.- Network and Communication S&D Patterns.- Pattern Integration Schemes.- SERENITY S&D Solution Development Process.- SERENITY Trust Model.- Verification Using the Secure Tropos Approach.- Verification Using APA-SHVT.- Verification Using Avispa.- Complementing Solutions with Monitoring.- Transforming Verification Results into Models.- Exploiting S&D Patterns in System Development.- SERENITY System Development Process.- Pattern Libraries and their Use System Development.- Exploiting S&D Patterns at Runtime.- The SERENITY Framework.- Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime.- Pattern Driven Detection of S&D Intrusions and Threats.- Diagnosing S&D Iintrusions.- Recovery and Control for S&D Intrusions and Threats.- Supporting the Evolution of S&D Patterns.- Experiences and Future Directions.- Applications of SERENITY Framework on Industrial Case Studies - Experiences and Challenges.- Standardization.- Realizing the Potential of SERENITY in Emerging AmI Ecosystems: Implications and Challenges.- Index.