The runtime monitoring framework of SERENITY

19Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter describes SERENITY's approach to runtime monitoring and the framework that has been developed to support it. Runtime monitoring is required in SERENITY in order to check for violations of security and dependability properties which are necessary for the correct operation of the security and dependability solutions that are available from the SERENITY framework. This chapter discusses how such properties are specified and monitored. The chapter focuses on the activation and execution of monitoring activities using S&D Patterns and the actions that may be undertaken following the detection of property violations. The approach is demonstrated in reference to one of the industrial case studies of the SERENITY project. © Springer Science + Business Media, LLC 2009.

Cite

CITATION STYLE

APA

Spanoudakis, G., Kloukinas, C., & Mahbub, K. (2009). The runtime monitoring framework of SERENITY. Advances in Information Security, 45, 213–237. https://doi.org/10.1007/978-0-387-88775-3_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free