Antonio Maña | Universidad de Málaga (original) (raw)
Run-Time Monitoring by Antonio Maña
Papers by Antonio Maña
The Encyclopedia of Digital …, 2006
... Information Use-Control in DGov Applications. Maña, Antonio; Yagüe, Mariemma; Karnouskos, Sta... more ... Information Use-Control in DGov Applications. Maña, Antonio; Yagüe, Mariemma; Karnouskos, Stamatis ; Abie, Habtamu. ... Title: Information Use-Control in DGov Applications; Author(s): Maña, Antonio; Yagüe, Mariemma; Karnouskos, Stamatis ; Abie, Habtamu; Report number: |. ...
Novática, 1998
... Pero en el caso de que existan muchas CAs, la certificación cruzada no produce una arquitectu... more ... Pero en el caso de que existan muchas CAs, la certificación cruzada no produce una arquitectura viable porque el número de cruces es demasiado elevado. A E H K N P B C I Ñ F L Q D J O G M R ... diseñar una arquitectura que no plantee problemas de escalabilidad; ...
Developing Ambient Intelligence
This paper presents an Ambient Intelligence based distributed architecture that uses intelligent ... more This paper presents an Ambient Intelligence based distributed architecture that uses intelligent agents with reasoning and planning mechanisms. The agents have the ability to obtain automatic and real-time information about the context using a set of technologies, such as radio frequency identification, wireless networks and wireless control devices. The architecture presented can be implemented on a wide diversity of dynamic environments to manage tasks and services.
2010 13th International Conference on Network-Based Information Systems, 2010
Agent-systems can bring important benefits especially in applications scenarios where highly dist... more Agent-systems can bring important benefits especially in applications scenarios where highly distributed, autonomous, intelligence, self-organizing and robust systems are required. Furthermore, high levels of autonomy and self-organization of agent systems provide excellent support for development of systems with high dependability requirements. Two main research areas that fall in this category are Ubiquitous Computing and Ambient Intelligence (AmI). Despite the attention
Resource constrained embedded systems (RCES) refers to systems which have memory and/or computati... more Resource constrained embedded systems (RCES) refers to systems which have memory and/or computational processing power constraints. They can be found literally everywhere, in many application sectors such as automotive, aerospace, and home control. They are in many types of devices, like sensors, automotive electronic control units, intelligent switches, and home appliances such as washing machines and meters. RCES are becoming increasingly complex and have various communication interfaces. Therefore, they have to be seen in the context of bigger systems or complete infrastructures. Consequently, their non functional requirements such as security and dependability (S&D) become more important as well as more difficult to achieve. The integration of S&D requires the availability of both application expertise and S&D expertise at the same time. In fact, S&D could also require both specific security expertise and specific dependability expertise. Model-Driven Engineering (MDE) provides a very useful contribution to the design of RCES applications since it bridges the gap between design issues and implementation concerns. Significant research is being carried out concerning MDE for embedded systems, at the level of system architecture, design techniques, testing, validation, proof of correctness, modeling, software reliability, operating systems, parallel processing and real-time processing. More research is needed on the use of MDE to enforce the integration of S&D requirements into the engineering process and to support the reuse of S&D mechanisms. The objective of this workshop is to foster the exchange of ideas among practitioners, researchers and industry involved in the deployment of secure and dependable resource-constrained embedded systems. Special emphasis will be devoted to promote discussion and interaction between researchers and practitioners focused on the particularly challenging task of efficiently integrating security and dependability solutions within the restricted available design space for RCES. Furthermore, one important focus is on the potential benefits of the combination of model-driven engineering with pattern-based representation of security and dependability solutions. Of particular interest is the exchange of concepts, prototypes, research ideas, and other results which contribute to the academic area and also benefit business and industrial communities. Some of the topics that we seek to include in the workshop are related to the development of models and tools to support the inclusion of SD issues into the RCES engineering process. Among the 12 initial submissions, 07 papers have been selected and organized in tow sessions, covering a wide spectrum of the subject of Security and Dependability for Resource Constrained Embedded Systems (secure and dependable RCES by design). In "ongoing project and new visions" category, we accepted 03 papers. It is our wish that the workshop provides an appropriate and relaxed environment to discuss these new ideas and approaches. In order to facilitate it each speaker will have 30 minutes for the presentation and discussion. Moreover, we will close the workshop with a working and a discussion session about: Trusted Computing Challenges in Resource Constrained Embedded Systems, Why, What and How.
Framework, 2011
Page 1. Design of Secure and energy-‐efficient embedded systems for Future Internet applications ... more Page 1. Design of Secure and energy-‐efficient embedded systems for Future Internet applications Deliverable 4.1 Part of the Seventh Framework Programme Funded by the EC – DG INFSO Project: Project Number: Deliverable: Title: Version: Confidentiality: Editors: Date: ...
IGI Global eBooks, 2008
ABSTRACT The scenarios of Ambient Intelligence introduce a new computing paradigm and set new cha... more ABSTRACT The scenarios of Ambient Intelligence introduce a new computing paradigm and set new challenges for the design and engineering of secure and dependable systems. This chapter describes SERENITY, a comprehensive approach to overcome those problems. The key to success in this scenario is to capture security expertise in such a way that it can be supported by automated means. SERENITY's integral model of S&D considers both static and dynamic aspects by relying in two main innovations: (i) the enhanced notion of S&D Patterns and Integration Schemes; and (ii) the computer aided run-time monitoring of the implemented security solutions. The combination of these innovations lays the foundations of an integrated, solid, flexible and practical S&D framework for AmI ecosystems. The chapter aims at clarifying the challenges introduced in AmI ecosystems and pointing out directions for research in the different areas involved.
2008 19th International Workshop on Database and Expert Systems Applications, 2008
Developing Ambient Intelligence
serenity-project.org
Page 1. A5.D4.2 End-user requirements specification language (final version) P. El Khoury, B. G... more Page 1. A5.D4.2 End-user requirements specification language (final version) P. El Khoury, B. Gallego-Nicasio, S. Kumar Sinha, K. Li, A. Maña, A. Muñoz, JF Ruiz, A. Saidane, D. Serrano Document Number A5.D4.2 Document ...
IGI Global eBooks, Jan 18, 2011
In this chapter the authors present a policy-based security engineering process for service orien... more In this chapter the authors present a policy-based security engineering process for service oriented applications, developed in the SERENITY and MISTICO projects. Security and dependability (S&D) are considered as first-class citizens in the proposed engineering process, which is ...
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2002
Interaction of organizations and their clients by using the Internet can produce meaningful benef... more Interaction of organizations and their clients by using the Internet can produce meaningful benefits in the accessibility, efficiency and availability of documents, regardless of time and location. However, some types of problems hinder a higher degree of communication. This paper presents some of the results of a Research Project that focuses on the influence of typical open networks risks in electronic interactions and on the need of creating software tools to manage electronic versions of the paper-based forms, as this is the traditional way of interaction through the Web.
This paper presents a security engineering process for the development of secure systems focusing... more This paper presents a security engineering process for the development of secure systems focusing on the specification and development of the Set-top Boxes. The paper describes the Set-top Box characteristics and functionalities and, using the process and its secure artefacts, models what we call a Domain Security Metamodel that defines all the security properties of that domain and implements them using Security Building Blocks. This security artefact can be used by system engineers when modelling their system model in order to fulfil its security requirements and, as a result, create a secure system that has security naturally integrated in its architecture and functionality.
The Encyclopedia of Digital …, 2006
... Information Use-Control in DGov Applications. Maña, Antonio; Yagüe, Mariemma; Karnouskos, Sta... more ... Information Use-Control in DGov Applications. Maña, Antonio; Yagüe, Mariemma; Karnouskos, Stamatis ; Abie, Habtamu. ... Title: Information Use-Control in DGov Applications; Author(s): Maña, Antonio; Yagüe, Mariemma; Karnouskos, Stamatis ; Abie, Habtamu; Report number: |. ...
Novática, 1998
... Pero en el caso de que existan muchas CAs, la certificación cruzada no produce una arquitectu... more ... Pero en el caso de que existan muchas CAs, la certificación cruzada no produce una arquitectura viable porque el número de cruces es demasiado elevado. A E H K N P B C I Ñ F L Q D J O G M R ... diseñar una arquitectura que no plantee problemas de escalabilidad; ...
Developing Ambient Intelligence
This paper presents an Ambient Intelligence based distributed architecture that uses intelligent ... more This paper presents an Ambient Intelligence based distributed architecture that uses intelligent agents with reasoning and planning mechanisms. The agents have the ability to obtain automatic and real-time information about the context using a set of technologies, such as radio frequency identification, wireless networks and wireless control devices. The architecture presented can be implemented on a wide diversity of dynamic environments to manage tasks and services.
2010 13th International Conference on Network-Based Information Systems, 2010
Agent-systems can bring important benefits especially in applications scenarios where highly dist... more Agent-systems can bring important benefits especially in applications scenarios where highly distributed, autonomous, intelligence, self-organizing and robust systems are required. Furthermore, high levels of autonomy and self-organization of agent systems provide excellent support for development of systems with high dependability requirements. Two main research areas that fall in this category are Ubiquitous Computing and Ambient Intelligence (AmI). Despite the attention
Resource constrained embedded systems (RCES) refers to systems which have memory and/or computati... more Resource constrained embedded systems (RCES) refers to systems which have memory and/or computational processing power constraints. They can be found literally everywhere, in many application sectors such as automotive, aerospace, and home control. They are in many types of devices, like sensors, automotive electronic control units, intelligent switches, and home appliances such as washing machines and meters. RCES are becoming increasingly complex and have various communication interfaces. Therefore, they have to be seen in the context of bigger systems or complete infrastructures. Consequently, their non functional requirements such as security and dependability (S&D) become more important as well as more difficult to achieve. The integration of S&D requires the availability of both application expertise and S&D expertise at the same time. In fact, S&D could also require both specific security expertise and specific dependability expertise. Model-Driven Engineering (MDE) provides a very useful contribution to the design of RCES applications since it bridges the gap between design issues and implementation concerns. Significant research is being carried out concerning MDE for embedded systems, at the level of system architecture, design techniques, testing, validation, proof of correctness, modeling, software reliability, operating systems, parallel processing and real-time processing. More research is needed on the use of MDE to enforce the integration of S&D requirements into the engineering process and to support the reuse of S&D mechanisms. The objective of this workshop is to foster the exchange of ideas among practitioners, researchers and industry involved in the deployment of secure and dependable resource-constrained embedded systems. Special emphasis will be devoted to promote discussion and interaction between researchers and practitioners focused on the particularly challenging task of efficiently integrating security and dependability solutions within the restricted available design space for RCES. Furthermore, one important focus is on the potential benefits of the combination of model-driven engineering with pattern-based representation of security and dependability solutions. Of particular interest is the exchange of concepts, prototypes, research ideas, and other results which contribute to the academic area and also benefit business and industrial communities. Some of the topics that we seek to include in the workshop are related to the development of models and tools to support the inclusion of SD issues into the RCES engineering process. Among the 12 initial submissions, 07 papers have been selected and organized in tow sessions, covering a wide spectrum of the subject of Security and Dependability for Resource Constrained Embedded Systems (secure and dependable RCES by design). In "ongoing project and new visions" category, we accepted 03 papers. It is our wish that the workshop provides an appropriate and relaxed environment to discuss these new ideas and approaches. In order to facilitate it each speaker will have 30 minutes for the presentation and discussion. Moreover, we will close the workshop with a working and a discussion session about: Trusted Computing Challenges in Resource Constrained Embedded Systems, Why, What and How.
Framework, 2011
Page 1. Design of Secure and energy-‐efficient embedded systems for Future Internet applications ... more Page 1. Design of Secure and energy-‐efficient embedded systems for Future Internet applications Deliverable 4.1 Part of the Seventh Framework Programme Funded by the EC – DG INFSO Project: Project Number: Deliverable: Title: Version: Confidentiality: Editors: Date: ...
IGI Global eBooks, 2008
ABSTRACT The scenarios of Ambient Intelligence introduce a new computing paradigm and set new cha... more ABSTRACT The scenarios of Ambient Intelligence introduce a new computing paradigm and set new challenges for the design and engineering of secure and dependable systems. This chapter describes SERENITY, a comprehensive approach to overcome those problems. The key to success in this scenario is to capture security expertise in such a way that it can be supported by automated means. SERENITY's integral model of S&D considers both static and dynamic aspects by relying in two main innovations: (i) the enhanced notion of S&D Patterns and Integration Schemes; and (ii) the computer aided run-time monitoring of the implemented security solutions. The combination of these innovations lays the foundations of an integrated, solid, flexible and practical S&D framework for AmI ecosystems. The chapter aims at clarifying the challenges introduced in AmI ecosystems and pointing out directions for research in the different areas involved.
2008 19th International Workshop on Database and Expert Systems Applications, 2008
Developing Ambient Intelligence
serenity-project.org
Page 1. A5.D4.2 End-user requirements specification language (final version) P. El Khoury, B. G... more Page 1. A5.D4.2 End-user requirements specification language (final version) P. El Khoury, B. Gallego-Nicasio, S. Kumar Sinha, K. Li, A. Maña, A. Muñoz, JF Ruiz, A. Saidane, D. Serrano Document Number A5.D4.2 Document ...
IGI Global eBooks, Jan 18, 2011
In this chapter the authors present a policy-based security engineering process for service orien... more In this chapter the authors present a policy-based security engineering process for service oriented applications, developed in the SERENITY and MISTICO projects. Security and dependability (S&D) are considered as first-class citizens in the proposed engineering process, which is ...
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2002
Interaction of organizations and their clients by using the Internet can produce meaningful benef... more Interaction of organizations and their clients by using the Internet can produce meaningful benefits in the accessibility, efficiency and availability of documents, regardless of time and location. However, some types of problems hinder a higher degree of communication. This paper presents some of the results of a Research Project that focuses on the influence of typical open networks risks in electronic interactions and on the need of creating software tools to manage electronic versions of the paper-based forms, as this is the traditional way of interaction through the Web.
This paper presents a security engineering process for the development of secure systems focusing... more This paper presents a security engineering process for the development of secure systems focusing on the specification and development of the Set-top Boxes. The paper describes the Set-top Box characteristics and functionalities and, using the process and its secure artefacts, models what we call a Domain Security Metamodel that defines all the security properties of that domain and implements them using Security Building Blocks. This security artefact can be used by system engineers when modelling their system model in order to fulfil its security requirements and, as a result, create a secure system that has security naturally integrated in its architecture and functionality.
The design and development of secure systems is a very complex task for non-expert security users... more The design and development of secure systems is a very complex task for non-expert security users because the integration of requirements, properties, constraints and functionalities of Security and Privacy (S&P) artifacts in systems requires a high level of expertise and knowledge. This task is already a challenge for an expert but for a non-expert is very difficult. One way of minimizing the complexity is by using security artefacts such as security patterns. Although traditional Security Patterns (SPs) offer many functionalities that help in this task, they have limitations that do not facilitate its use by non-experts. To overcome those limitations, we proposed a new type of SP called COmputer-Supported Security Pattern (COSSP) that aims to cover all the gaps of traditional SPs by extending them with new contents, making them machine-processable, adding engineering oriented extensions and providing trust-management capabilities. In order to demonstrate how COSSPs facilitate and enhance the creation of secure systems this paper illustrates how it is applied and integrated into a system model during the engineering process of a given SUD. The integration covers both the design and the development phases. Therefore, our paper will present the benefits of our approach in creating a secure system and how it improves the traditional security patterns functionality in the different stages of an engineering process.