Skip to main content

SERENITY in Air Traffic Management

  • Chapter
  • First Online:
Book cover Security and Dependability for Ambient Intelligence

Part of the book series: Advances in Information Security ((ADIS,volume 45))

  • 375 Accesses

Abstract

This chapter is concerned with the validation of an implementation of the SERENITY Runtime Framework (SRF) tailored for the Air Traffic Management (ATM) domain. It reports our experience in the design and validation phases of a tool, which relies on the SRF in order to support Security and Dependability (S&D) Patterns into work practices. In particular, this chapter pinpoints the activities concerning the identification of S&D Patterns, the design of an ATM prototype and its validation. The validation activities involve qualitative as well as quantitative approaches. These activities as a whole highlight the validation process for adopting S&D Patterns within the ATM domain. Moreover, they stress how S&D Patters enhance and relate to critical features within an industry domain. The empirical results point out that S&D Patterns relate to work practices. Furthermore, they highlight design and validation activities in order to tailor systems relying on S&D Patterns to specific application domains. This strengths and supports the adoption of S&D Patterns in order to address AmI (Ambient Intelligence) requirements (e.g., awareness, proactiveness, resilience, etc.) within the ATM domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Asnar Y, Giorgini P, Massacci F, Saidane A, Bonato R, Meduri V, Riccucci C (2007) Secure and dependable patterns in organizations: An empirical approach. In: Proceedings of the IEEE 15th International Conference on Requirements Engineering, RE'07, IEEE Computer Society, pp 287-292

    Google Scholar 

  2. Avizienis A, Laprie JC, Randell B, Landwehr CE (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE TDSC 1(1):11-33

    Google Scholar 

  3. Bentley R, et al (1992) Ethnographically-Informed Systems Design for Air Traffic Control. In: Proceedings of CSCW, ACM, pp 123-129

    Google Scholar 

  4. EUROCONTROL (2007) European Operational Concept Validation Methodology (E-OCVM). EUROCONTROL, 2nd edn

    Google Scholar 

  5. Gamma E, et al (1995) Design Patters: Elements of Reusable Object-Oriented Software. Addison-Wesley

    Google Scholar 

  6. Giacomo VD, Felici M, Meduri V, Presenza D, Riccucci C, Tedeschi A (2008) Using security and dependability patterns for reaction processes. In: Proceedings of the 19th International Conference on Database and Expert Systems Application, DEXA '08, IEEE Computer Society, pp 315-319

    Google Scholar 

  7. Giorgini P, Massacci F, Mylopoulos J, Zannone N (2005) Modeling security requirements through ownership, permission and delegation. In: Proc. of RE'05, IEEE CS Press, pp 167-176

    Google Scholar 

  8. Halverson CA, Ackerman MS (2008) The Bird of an Organizational Resource: The Surprising Life of a Cheat Sheet. In: Ackerman MS, et al (eds) Resources, Co-Evolution and Artifacts, CSCW, Springer-Verlag, chap 1

    Google Scholar 

  9. Halverson CA, et al (1992) A Systems Approach to Design: Developing a Usable Automation Tool for Air Traffic Control. In: Proceedings of the IEEE/AIAA 11th Conference on Digital Avionics Systems, pp 167-173

    Google Scholar 

  10. ICAO (2005) Global Air Traffic Management Operational Concept. International Civil Aviation Organization (ICAO)

    Google Scholar 

  11. ISTAG (2002) Trust, dependability, security and privacy for IST in FP6. ISTAG - IST Advisory Group

    Google Scholar 

  12. ISTAG (2003) Ambient Intelligence: from vision to reality. ISTAG - IST Advisory Group

    Google Scholar 

  13. Lanzi P, Marti P, Pozzi S, Scrivani P (2004) Users as cultural mediators in interactive system design. In: Reed D, Baxter G, Blythe M (eds) Living and Working with Technology, Proceedings of the twelfth European conference on cognitive ergonomics, ECCE12

    Google Scholar 

  14. Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting. In: Proc. of RE'03, pp 151-161

    Google Scholar 

  15. Marti P, Scrivani P (2003) The representation of context in the simulation of complex systems. Cognitive Technologies Journal 8(1):32-42

    Google Scholar 

  16. Marti P, Lanzi P, Pucci F (2001) Evaluating safety and usability of atm systems. In: Proceedings of the 4th International seminar on ATM R&D, FAA and Eurocontrol

    Google Scholar 

  17. Martin D, Sommerville I (2004) Patterns of cooperative interaction: Linking ethnomethodology and design. ACM Transactions on Computer-Human Interaction 11(1):59-89

    Article  Google Scholar 

  18. Maulsby D, Greenberg S, Mander R (1993) Prototyping an Intelligent Agent through Wizard of Oz. In: Proceedings of INTERCHI'93, ACM, pp 277-284

    Google Scholar 

  19. Saidane A (2007) Serenity: A generic framework for dependability construction - a patterns oriented approach. In: Butler M, Jones CB, Romanovsky A, Troubitsyna E (eds) Proceedings of the Workshop on Methods, Models and Tools for Fault Tolerance, School of Computing Science, University of Newcastle upon Tyne, no. CS-TR-1032 in Technical Report Series, pp 111-117

    Google Scholar 

  20. Schmidt D (2000) Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked Objects, vol 2. John Wiley & Sons

    Google Scholar 

  21. Schumacher M, et al (2006) Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons

    Google Scholar 

  22. Shalloway A, Trott JR (2005) Design Patterns: A New Perspective on Object-Oriented Design, 2nd edn. Addison-Wesley

    Google Scholar 

  23. Sheridan TB (2002) Humans and Automation: System Design and Research Issues. Wiley

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Massimo Felici .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag US

About this chapter

Cite this chapter

Felici, M., Meduri, V., Tedeschi, A., Riccucci, C. (2009). SERENITY in Air Traffic Management. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-88775-3_20

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-88774-6

  • Online ISBN: 978-0-387-88775-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics