Abstract
This chapter is concerned with the validation of an implementation of the SERENITY Runtime Framework (SRF) tailored for the Air Traffic Management (ATM) domain. It reports our experience in the design and validation phases of a tool, which relies on the SRF in order to support Security and Dependability (S&D) Patterns into work practices. In particular, this chapter pinpoints the activities concerning the identification of S&D Patterns, the design of an ATM prototype and its validation. The validation activities involve qualitative as well as quantitative approaches. These activities as a whole highlight the validation process for adopting S&D Patterns within the ATM domain. Moreover, they stress how S&D Patters enhance and relate to critical features within an industry domain. The empirical results point out that S&D Patterns relate to work practices. Furthermore, they highlight design and validation activities in order to tailor systems relying on S&D Patterns to specific application domains. This strengths and supports the adoption of S&D Patterns in order to address AmI (Ambient Intelligence) requirements (e.g., awareness, proactiveness, resilience, etc.) within the ATM domain.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Asnar Y, Giorgini P, Massacci F, Saidane A, Bonato R, Meduri V, Riccucci C (2007) Secure and dependable patterns in organizations: An empirical approach. In: Proceedings of the IEEE 15th International Conference on Requirements Engineering, RE'07, IEEE Computer Society, pp 287-292
Avizienis A, Laprie JC, Randell B, Landwehr CE (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE TDSC 1(1):11-33
Bentley R, et al (1992) Ethnographically-Informed Systems Design for Air Traffic Control. In: Proceedings of CSCW, ACM, pp 123-129
EUROCONTROL (2007) European Operational Concept Validation Methodology (E-OCVM). EUROCONTROL, 2nd edn
Gamma E, et al (1995) Design Patters: Elements of Reusable Object-Oriented Software. Addison-Wesley
Giacomo VD, Felici M, Meduri V, Presenza D, Riccucci C, Tedeschi A (2008) Using security and dependability patterns for reaction processes. In: Proceedings of the 19th International Conference on Database and Expert Systems Application, DEXA '08, IEEE Computer Society, pp 315-319
Giorgini P, Massacci F, Mylopoulos J, Zannone N (2005) Modeling security requirements through ownership, permission and delegation. In: Proc. of RE'05, IEEE CS Press, pp 167-176
Halverson CA, Ackerman MS (2008) The Bird of an Organizational Resource: The Surprising Life of a Cheat Sheet. In: Ackerman MS, et al (eds) Resources, Co-Evolution and Artifacts, CSCW, Springer-Verlag, chap 1
Halverson CA, et al (1992) A Systems Approach to Design: Developing a Usable Automation Tool for Air Traffic Control. In: Proceedings of the IEEE/AIAA 11th Conference on Digital Avionics Systems, pp 167-173
ICAO (2005) Global Air Traffic Management Operational Concept. International Civil Aviation Organization (ICAO)
ISTAG (2002) Trust, dependability, security and privacy for IST in FP6. ISTAG - IST Advisory Group
ISTAG (2003) Ambient Intelligence: from vision to reality. ISTAG - IST Advisory Group
Lanzi P, Marti P, Pozzi S, Scrivani P (2004) Users as cultural mediators in interactive system design. In: Reed D, Baxter G, Blythe M (eds) Living and Working with Technology, Proceedings of the twelfth European conference on cognitive ergonomics, ECCE12
Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting. In: Proc. of RE'03, pp 151-161
Marti P, Scrivani P (2003) The representation of context in the simulation of complex systems. Cognitive Technologies Journal 8(1):32-42
Marti P, Lanzi P, Pucci F (2001) Evaluating safety and usability of atm systems. In: Proceedings of the 4th International seminar on ATM R&D, FAA and Eurocontrol
Martin D, Sommerville I (2004) Patterns of cooperative interaction: Linking ethnomethodology and design. ACM Transactions on Computer-Human Interaction 11(1):59-89
Maulsby D, Greenberg S, Mander R (1993) Prototyping an Intelligent Agent through Wizard of Oz. In: Proceedings of INTERCHI'93, ACM, pp 277-284
Saidane A (2007) Serenity: A generic framework for dependability construction - a patterns oriented approach. In: Butler M, Jones CB, Romanovsky A, Troubitsyna E (eds) Proceedings of the Workshop on Methods, Models and Tools for Fault Tolerance, School of Computing Science, University of Newcastle upon Tyne, no. CS-TR-1032 in Technical Report Series, pp 111-117
Schmidt D (2000) Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked Objects, vol 2. John Wiley & Sons
Schumacher M, et al (2006) Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons
Shalloway A, Trott JR (2005) Design Patterns: A New Perspective on Object-Oriented Design, 2nd edn. Addison-Wesley
Sheridan TB (2002) Humans and Automation: System Design and Research Issues. Wiley
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Felici, M., Meduri, V., Tedeschi, A., Riccucci, C. (2009). SERENITY in Air Traffic Management. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_20
Download citation
DOI: https://doi.org/10.1007/978-0-387-88775-3_20
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-88774-6
Online ISBN: 978-0-387-88775-3
eBook Packages: Computer ScienceComputer Science (R0)