Pub Date : 2020-03-01DOI: 10.1109/ICSA-C50368.2020.00010
P. Merson, J. Yoder
Many have suggested using Domain-Driven Design (DDD) to help define the functional scope of microservices. But how to apply this idea in practice is not clear to everyone. DDD is a domain modeling technique created in the early 2000s. Microservices is an architecture style that became popular in 2015 as means to break software solutions into a set of independently deployed services. In this full-day tutorial we’ll cover basic DDD concepts and discuss why and how DDD can help to create microservices with better availability, scalability, reliability, and modifiability. Using examples, we’ll navigate from a domain model created using DDD to the design of both synchronous (REST-based) and asynchronous (reactive) microservices. We’ll explore five different microservice design scenarios around DDD aggregates, bounded contexts (BC), domain events and other strategies for inter-BC interaction.
{"title":"Modeling Microservices with DDD","authors":"P. Merson, J. Yoder","doi":"10.1109/ICSA-C50368.2020.00010","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00010","url":null,"abstract":"Many have suggested using Domain-Driven Design (DDD) to help define the functional scope of microservices. But how to apply this idea in practice is not clear to everyone. DDD is a domain modeling technique created in the early 2000s. Microservices is an architecture style that became popular in 2015 as means to break software solutions into a set of independently deployed services. In this full-day tutorial we’ll cover basic DDD concepts and discuss why and how DDD can help to create microservices with better availability, scalability, reliability, and modifiability. Using examples, we’ll navigate from a domain model created using DDD to the design of both synchronous (REST-based) and asynchronous (reactive) microservices. We’ll explore five different microservice design scenarios around DDD aggregates, bounded contexts (BC), domain events and other strategies for inter-BC interaction.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126961625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICSA-C50368.2020.00012
Fahed Alkhabbas, Romina Spalazzese, M. Cerioli, Maurizio Leotta, G. Reggio
Internet of Things (IoT) systems are complex and multifaceted, and the design of their architectures needs to consider many aspects at a time. Design decisions concern, for instance, the modeling of software components and their interconnections, as well as where to deploy the components within the available hardware infrastructure in the Edge-Cloud continuum. A relevant and challenging task, in this context, is to identify optimal deployment models due to all the different aspects involved, such as extra-functional requirements of the system, heterogeneity of the hardware resources concerning their processing and storage capabilities, and constraints like legal issues and operational cost limits. To gain insights about the deployment decisions concerning IoT systems in practice, and the factors that influence those decisions, we report about an industrial survey we conducted with 66 IoT architects from 18 countries across the world. Each participant filled in a questionnaire that comprises 15 questions. By analyzing the collected data, we have two main findings: (i) architects rely on the Cloud more than the Edge for deploying the software components of IoT systems, in the majority of the IoT application domains; and (ii) the main factors driving deployment decisions are four: reliability, performance, security, and cost.
{"title":"On the Deployment of IoT Systems: An Industrial Survey","authors":"Fahed Alkhabbas, Romina Spalazzese, M. Cerioli, Maurizio Leotta, G. Reggio","doi":"10.1109/ICSA-C50368.2020.00012","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00012","url":null,"abstract":"Internet of Things (IoT) systems are complex and multifaceted, and the design of their architectures needs to consider many aspects at a time. Design decisions concern, for instance, the modeling of software components and their interconnections, as well as where to deploy the components within the available hardware infrastructure in the Edge-Cloud continuum. A relevant and challenging task, in this context, is to identify optimal deployment models due to all the different aspects involved, such as extra-functional requirements of the system, heterogeneity of the hardware resources concerning their processing and storage capabilities, and constraints like legal issues and operational cost limits. To gain insights about the deployment decisions concerning IoT systems in practice, and the factors that influence those decisions, we report about an industrial survey we conducted with 66 IoT architects from 18 countries across the world. Each participant filled in a questionnaire that comprises 15 questions. By analyzing the collected data, we have two main findings: (i) architects rely on the Cloud more than the Edge for deploying the software components of IoT systems, in the majority of the IoT application domains; and (ii) the main factors driving deployment decisions are four: reliability, performance, security, and cost.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114929568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICSA-C50368.2020.00008
T. Kuhn, Frank Schnicke, P. Antonino
Enabling Industry 4.0 with Eclipse BaSyx: Architecting the Factory of the Future with Digital Twins and Service Oriented Architectures.
用Eclipse BaSyx实现工业4.0:用数字孪生和面向服务的体系结构构建未来工厂。
{"title":"Towards the Factory of the Future with Digital Twins and SOA : Towards the Factory of the Future with Digital Twins and SOA","authors":"T. Kuhn, Frank Schnicke, P. Antonino","doi":"10.1109/ICSA-C50368.2020.00008","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00008","url":null,"abstract":"Enabling Industry 4.0 with Eclipse BaSyx: Architecting the Factory of the Future with Digital Twins and Service Oriented Architectures.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128604087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICSA-C50368.2020.00038
Gastón Márquez, C. Taramasco, H. Astudillo
The Electronic Health Record (EHR) is a digital document that stores sensitive patient information. In this regard, there are novel techniques and methods for satisfying security in EHR in specific domains (such as authentication, networking, cryptography, among others). Nevertheless, there is not enough evidence on quality instruments composed of cross-cutting security metrics obtained from academic as well as grey literature. This article proposes a quality instrument that measures the satisfaction degree of security in EHRs. The instrument is composed of five security approaches and nineteen security metrics collected and characterized from the academic and grey literature. We evaluated the effectiveness of the quality instrument in a case study with 20 healthcare actors in Chile. The results suggest that the metric is quite effective, but it depends on the degree of security training of the clinical staff. The findings of this study support the idea that our quality instrument can be considered as a starting point to evaluate the quality of EHRs.
{"title":"Defining Security Metrics To Evaluate Electronic Health Records Systems: A Case Study in Chile","authors":"Gastón Márquez, C. Taramasco, H. Astudillo","doi":"10.1109/ICSA-C50368.2020.00038","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00038","url":null,"abstract":"The Electronic Health Record (EHR) is a digital document that stores sensitive patient information. In this regard, there are novel techniques and methods for satisfying security in EHR in specific domains (such as authentication, networking, cryptography, among others). Nevertheless, there is not enough evidence on quality instruments composed of cross-cutting security metrics obtained from academic as well as grey literature. This article proposes a quality instrument that measures the satisfaction degree of security in EHRs. The instrument is composed of five security approaches and nineteen security metrics collected and characterized from the academic and grey literature. We evaluated the effectiveness of the quality instrument in a case study with 20 healthcare actors in Chile. The results suggest that the metric is quite effective, but it depends on the degree of security training of the clinical staff. The findings of this study support the idea that our quality instrument can be considered as a starting point to evaluate the quality of EHRs.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132078974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICSA-C50368.2020.00048
Iohan Gonçalves Vargas, Diego Nascimento, R. Braga
Software reuse is a software engineering technique that fosters productivity and quality by encouraging the reuse of existing software artifacts. Despite advantages, we have identified that software engineers must cope with independent and isolated reuse activities. This isolation can hinder the success of an effective reuse activity. In this paper, we discuss how an integrated support for reuse would benefit this activity. Based on a previous approach for developing directed System of Systems (SoS), and on a systematic mapping about integration of reuse environments, we have identified that SoS and Service Oriented Architecture could be employed together for leveraging reuse, and this has motivated us to design and develop a new directed SoS, named SoS-Reuse. As validation, SoS-Reuse has been qualitatively assessed with software architects. Therefore, we claim that our SoS proposal could be used as a stepping stone to improve the reuse activity and for creating similar SoS for other domains.
{"title":"Fostering Reuse by Integration: A Directed System of Systems Development Case","authors":"Iohan Gonçalves Vargas, Diego Nascimento, R. Braga","doi":"10.1109/ICSA-C50368.2020.00048","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00048","url":null,"abstract":"Software reuse is a software engineering technique that fosters productivity and quality by encouraging the reuse of existing software artifacts. Despite advantages, we have identified that software engineers must cope with independent and isolated reuse activities. This isolation can hinder the success of an effective reuse activity. In this paper, we discuss how an integrated support for reuse would benefit this activity. Based on a previous approach for developing directed System of Systems (SoS), and on a systematic mapping about integration of reuse environments, we have identified that SoS and Service Oriented Architecture could be employed together for leveraging reuse, and this has motivated us to design and develop a new directed SoS, named SoS-Reuse. As validation, SoS-Reuse has been qualitatively assessed with software architects. Therefore, we claim that our SoS proposal could be used as a stepping stone to improve the reuse activity and for creating similar SoS for other domains.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115523568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICSA-C50368.2020.00043
H. V. Stockhausen, M. Rose
This paper is a case study describing our practical experience in the area of cybersecurity for medical devices. We describe how Siemens Healthineers uses a continuous security patch delivery model in a regulated market across 15+ business lines which cover our huge portfolio of imaging modalities, laboratory and point-of-care instruments. The case study addresses how we have implemented a continuous security patch delivery strategy. The strategy embraces a systematic way of product-specific vulnerability evaluations based on design knowledge and operator-oriented risk communication which are the novel aspects of this work. Focusing on the ‘real’ cybersecurity risks in the early phase of the continuous delivery process leads to reduced cost for post-market management of medical devices. The paper also describes how this dynamic, continuous and highly automated approach is intended to satisfy the current and future demands of the National Telecommunications and Information Administration (NTIA) the existing FDA post-market guidance and the upcoming revision of the FDA pre-market guidance on cybersecurity to provide operators with a “software bill of material” (SBOM).
{"title":"Continuous security patch delivery and risk management for medical devices","authors":"H. V. Stockhausen, M. Rose","doi":"10.1109/ICSA-C50368.2020.00043","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00043","url":null,"abstract":"This paper is a case study describing our practical experience in the area of cybersecurity for medical devices. We describe how Siemens Healthineers uses a continuous security patch delivery model in a regulated market across 15+ business lines which cover our huge portfolio of imaging modalities, laboratory and point-of-care instruments. The case study addresses how we have implemented a continuous security patch delivery strategy. The strategy embraces a systematic way of product-specific vulnerability evaluations based on design knowledge and operator-oriented risk communication which are the novel aspects of this work. Focusing on the ‘real’ cybersecurity risks in the early phase of the continuous delivery process leads to reduced cost for post-market management of medical devices. The paper also describes how this dynamic, continuous and highly automated approach is intended to satisfy the current and future demands of the National Telecommunications and Information Administration (NTIA) the existing FDA post-market guidance and the upcoming revision of the FDA pre-market guidance on cybersecurity to provide operators with a “software bill of material” (SBOM).","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"531 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICSA-C50368.2020.00032
A. Fernandes, V. Rocha, A. F. Conceição, F. Horita
Blockchain technology has been applied in several areas, ranging from financial to health. Although this technology offers benefits, for instance the immutability, anonymity, and decentralization of information, its use presents some problems, been the scalability in terms of storage size one of them. This paper presents a scalable architecture for sharing electronic health records using a multi-channel hyperledger blockchain. The architecture uses one blockchain to record patient visits and one blockchain for each health institution to record links that point to Electronic Health Records (EHRs) stored in external systems. Among the main conclusions, the final results highlight the scalability of the proposed architecture, when compared to the related work models in the heterogeneous network.
{"title":"Scalable Architecture for sharing EHR using the Hyperledger Blockchain","authors":"A. Fernandes, V. Rocha, A. F. Conceição, F. Horita","doi":"10.1109/ICSA-C50368.2020.00032","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00032","url":null,"abstract":"Blockchain technology has been applied in several areas, ranging from financial to health. Although this technology offers benefits, for instance the immutability, anonymity, and decentralization of information, its use presents some problems, been the scalability in terms of storage size one of them. This paper presents a scalable architecture for sharing electronic health records using a multi-channel hyperledger blockchain. The architecture uses one blockchain to record patient visits and one blockchain for each health institution to record links that point to Electronic Health Records (EHRs) stored in external systems. Among the main conclusions, the final results highlight the scalability of the proposed architecture, when compared to the related work models in the heterogeneous network.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129815827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICSA-C50368.2020.00042
Marcio N. P. Silva, A. Sena, L. C. Pôrto
HLA typing testing has a crucial role in identifying compatibility between organ donors and recipients. These evaluations need to be performed by specialized laboratories that, in general, have modern equipment but do not have an effective management system that controls the entire process. The HLA typing process is complex and extensive, involving diverse teams and sectors of the laboratory, with an intense exchange of information. Data processing is extremely important and requires strict control to ensure the traceability and reliability of results. This paper presents a case study of the development of an information system for managing an HLA typing laboratory. Moreover, A detailed study of the information flow of the HLA typing process is presented, as well as an implementation of a customizable control system for laboratory processes management. It is expected that from the use of this software in the HLA-UERJ laboratory, it can be disseminated in other public laboratories in the state of Rio de Janeiro.
{"title":"A Case Study for Implementing a Laboratory Information Management System for HLA Typing","authors":"Marcio N. P. Silva, A. Sena, L. C. Pôrto","doi":"10.1109/ICSA-C50368.2020.00042","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00042","url":null,"abstract":"HLA typing testing has a crucial role in identifying compatibility between organ donors and recipients. These evaluations need to be performed by specialized laboratories that, in general, have modern equipment but do not have an effective management system that controls the entire process. The HLA typing process is complex and extensive, involving diverse teams and sectors of the laboratory, with an intense exchange of information. Data processing is extremely important and requires strict control to ensure the traceability and reliability of results. This paper presents a case study of the development of an information system for managing an HLA typing laboratory. Moreover, A detailed study of the information flow of the HLA typing process is presented, as well as an implementation of a customizable control system for laboratory processes management. It is expected that from the use of this software in the HLA-UERJ laboratory, it can be disseminated in other public laboratories in the state of Rio de Janeiro.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116672796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICSA-C50368.2020.00025
S. Kalra, T. Prabhakar
A Software-as-a-Service offering provides ready to use solutions for its tenants. Tenants having different quality requirements are deployed on separate dedicated instances. The concerns related to generating variable quality responses using single instance are not explicitly handled in current design approaches. A lack of standardized tactics and design guidelines also make it difficult for an architect to embed these multi-tenant design decisions at the early stage. In this work, we highlight a few domain-independent architectural concerns that can be used to manage multiple heterogeneous tenants on a shared application instance. We derive some quality requirements that are significant in the multi-tenant scenario, related tactics, measurements and analyze the impact on other software product quality attributes.
{"title":"Multi-tenant Quality Attributes to Manage Tenants in SaaS Applications","authors":"S. Kalra, T. Prabhakar","doi":"10.1109/ICSA-C50368.2020.00025","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00025","url":null,"abstract":"A Software-as-a-Service offering provides ready to use solutions for its tenants. Tenants having different quality requirements are deployed on separate dedicated instances. The concerns related to generating variable quality responses using single instance are not explicitly handled in current design approaches. A lack of standardized tactics and design guidelines also make it difficult for an architect to embed these multi-tenant design decisions at the early stage. In this work, we highlight a few domain-independent architectural concerns that can be used to manage multiple heterogeneous tenants on a shared application instance. We derive some quality requirements that are significant in the multi-tenant scenario, related tactics, measurements and analyze the impact on other software product quality attributes.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123023596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICSA-C50368.2020.00046
Anderson Tavares Queiroz Afonso, Luciana Chueri, R. Santos
Modern companies need to revisit and constantly improve their business practices in order to remain profitable in the light of the global competition. Digital Ecosystems (DE) have emerged as an innovative approach to business because they transcend traditional collaborative environments towards an interactive digital environment with the intensive participation of diverse external actors. However, adjusting the existing business processes to the digital environment is not simple, especially taking into account the culture of the DE actors and the characteristics of such environment. The same issue applies when the ecosystem is focused on software development as investigated in a Software Ecosystem (SECO). In this context, this study aims to understand how the management of traditional business processes can be applied into DE or SECO management. To this end, a systematic mapping study regarding business process management in DE and SECO is presented. This study is important since it helps researchers and practitioners to understand how these processes can provide inputs for modeling relationships among the DE actors, besides providing support to ecosystem managers. The study confirms that the use of business process management techniques or methods as a support for DE or SECO managers or developers is an emergent field.
{"title":"Business Process Management in Digital and Software Ecosystems: A Systematic Mapping Study","authors":"Anderson Tavares Queiroz Afonso, Luciana Chueri, R. Santos","doi":"10.1109/ICSA-C50368.2020.00046","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00046","url":null,"abstract":"Modern companies need to revisit and constantly improve their business practices in order to remain profitable in the light of the global competition. Digital Ecosystems (DE) have emerged as an innovative approach to business because they transcend traditional collaborative environments towards an interactive digital environment with the intensive participation of diverse external actors. However, adjusting the existing business processes to the digital environment is not simple, especially taking into account the culture of the DE actors and the characteristics of such environment. The same issue applies when the ecosystem is focused on software development as investigated in a Software Ecosystem (SECO). In this context, this study aims to understand how the management of traditional business processes can be applied into DE or SECO management. To this end, a systematic mapping study regarding business process management in DE and SECO is presented. This study is important since it helps researchers and practitioners to understand how these processes can provide inputs for modeling relationships among the DE actors, besides providing support to ecosystem managers. The study confirms that the use of business process management techniques or methods as a support for DE or SECO managers or developers is an emergent field.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132728940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}