首页 > 最新文献

Proccedings of the 10th European Conference on Software Architecture Workshops最新文献

英文 中文
Tailoring complexity metrics for simulink models 为simulink模型定制复杂性度量
Pub Date : 2016-11-28 DOI: 10.1145/2993412.3004853
Marta Olszewska, Y. Dajsuren, Harald Altinger, Alexander Serebrenik, M. Waldén, M. Brand
The size and complexity of Simulink models is constantly increasing, just as the systems which they represent. Therefore, it is beneficial to control them already at the design phase. In this paper we establish a set of complexity metrics for Simulink models to capture diverse aspects of complexity by proposing new and redefining existing metrics. To evaluate the applicability of our metrics, we compare them with the closed-source metric proposed by Mathworks. Moreover, through a case study from the automotive domain, we relate such metrics to quality attributes as determined by domain experts, and correlate them to known faults. Preliminary assessment suggests that complexity is closely related to analysability, understandability, and testability.
与它们所代表的系统一样,Simulink模型的大小和复杂性也在不断增加。因此,在设计阶段就对其进行控制是有益的。在本文中,我们为Simulink模型建立了一套复杂性度量,通过提出新的和重新定义现有的度量来捕获复杂性的不同方面。为了评估我们的度量标准的适用性,我们将它们与Mathworks提出的闭源度量标准进行比较。此外,通过汽车领域的案例研究,我们将这些度量与领域专家确定的质量属性联系起来,并将它们与已知故障联系起来。初步评估表明,复杂性与可分析性、可理解性和可测试性密切相关。
{"title":"Tailoring complexity metrics for simulink models","authors":"Marta Olszewska, Y. Dajsuren, Harald Altinger, Alexander Serebrenik, M. Waldén, M. Brand","doi":"10.1145/2993412.3004853","DOIUrl":"https://doi.org/10.1145/2993412.3004853","url":null,"abstract":"The size and complexity of Simulink models is constantly increasing, just as the systems which they represent. Therefore, it is beneficial to control them already at the design phase. In this paper we establish a set of complexity metrics for Simulink models to capture diverse aspects of complexity by proposing new and redefining existing metrics. To evaluate the applicability of our metrics, we compare them with the closed-source metric proposed by Mathworks. Moreover, through a case study from the automotive domain, we relate such metrics to quality attributes as determined by domain experts, and correlate them to known faults. Preliminary assessment suggests that complexity is closely related to analysability, understandability, and testability.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127082936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Automatic proof of freedom from interference with IFFree 自动证明不受干扰IFFree
Pub Date : 2016-11-28 DOI: 10.1145/2993412.3007551
C. Faure, V. Delebarre
Manually proving software level Freedom From Interference is really difficult because it requires the identification of all code statements where an interference may happen. Static analysis enables the automatic identification of code statement leading to interferences and SafeRiver has developed a static tool for software level interferences identification.
手动证明软件级别的不受干扰是非常困难的,因为它需要识别可能发生干扰的所有代码语句。静态分析可以自动识别导致干扰的代码语句,saferriver开发了一个用于软件级干扰识别的静态工具。
{"title":"Automatic proof of freedom from interference with IFFree","authors":"C. Faure, V. Delebarre","doi":"10.1145/2993412.3007551","DOIUrl":"https://doi.org/10.1145/2993412.3007551","url":null,"abstract":"Manually proving software level Freedom From Interference is really difficult because it requires the identification of all code statements where an interference may happen. Static analysis enables the automatic identification of code statement leading to interferences and SafeRiver has developed a static tool for software level interferences identification.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121723360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metamodeling of reference software architecture and automatic code generation 参考软件体系结构的元建模和自动代码生成
Pub Date : 2016-11-28 DOI: 10.1145/2993412.3004850
N. K. Turhan, Halit Oğuztüzün
Architectures of all application software that are developed by Sea Defense Systems Software Team in ASELSAN are created based on a predefined reference software architecture. In order to facilitate the process of transition from the software architectural design, which is created in conformance with the reference software architecture, to implementation a model driven software development approach is put forth. In this approach, based on a metamodel for the predefined reference software architecture, a domain specific language is defined. In the last stage, models that are created by using the domain specific language are automatically transformed to source code.
ASELSAN海防系统软件团队开发的所有应用软件的体系结构都是基于预定义的参考软件体系结构创建的。为了方便从按照参考软件体系结构创建的软件体系结构设计过渡到实现模型驱动的软件开发方法。在这种方法中,基于预定义的参考软件体系结构的元模型,定义了特定于领域的语言。在最后一个阶段,使用领域特定语言创建的模型被自动转换为源代码。
{"title":"Metamodeling of reference software architecture and automatic code generation","authors":"N. K. Turhan, Halit Oğuztüzün","doi":"10.1145/2993412.3004850","DOIUrl":"https://doi.org/10.1145/2993412.3004850","url":null,"abstract":"Architectures of all application software that are developed by Sea Defense Systems Software Team in ASELSAN are created based on a predefined reference software architecture. In order to facilitate the process of transition from the software architectural design, which is created in conformance with the reference software architecture, to implementation a model driven software development approach is put forth. In this approach, based on a metamodel for the predefined reference software architecture, a domain specific language is defined. In the last stage, models that are created by using the domain specific language are automatically transformed to source code.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134195945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reusing security solutions: a repository for architectural decision support 重用安全解决方案:用于架构决策支持的存储库
Pub Date : 2016-11-28 DOI: 10.1145/2993412.3007556
Stefanie Jasser, Matthias Riebisch
Today, the interplay of security design and architecting is still poorly understood and architects lack knowledge about security and architectural security design. Yet, architectural knowledge on security design and its impact on other architectural properties is essential for making right decisions in architecture design. Knowledge is covered within solutions such as architectural patterns, tactics, and tools. Sharing it including the experience other architects gained using these solutions would enable better reuse of security solutions. In this paper, we present a repository for security solutions that supports architectural decisions including quality goal trade-offs. Its metamodel was adapted to special demands of security as a quality goal. The repository supports architecture decisions not only through populating approved solutions but through a recommender system that documents knowledge and experiences of architecture and security experts. We provide a case study to illustrate the repository's features and its application during architecture design.
今天,人们对安全设计和架构的相互作用仍然知之甚少,架构师缺乏关于安全性和架构安全性设计的知识。然而,关于安全设计的体系结构知识及其对其他体系结构属性的影响对于在体系结构设计中做出正确决策至关重要。知识包含在诸如体系结构模式、策略和工具之类的解决方案中。共享它,包括其他架构师使用这些解决方案获得的经验,将能够更好地重用安全解决方案。在本文中,我们为支持体系结构决策(包括质量目标权衡)的安全解决方案提供了一个存储库。它的元模型适应了作为质量目标的安全的特殊需求。存储库不仅通过填充已批准的解决方案,而且通过记录体系结构和安全专家的知识和经验的推荐系统来支持体系结构决策。我们提供了一个案例研究来说明存储库的特性及其在体系结构设计期间的应用。
{"title":"Reusing security solutions: a repository for architectural decision support","authors":"Stefanie Jasser, Matthias Riebisch","doi":"10.1145/2993412.3007556","DOIUrl":"https://doi.org/10.1145/2993412.3007556","url":null,"abstract":"Today, the interplay of security design and architecting is still poorly understood and architects lack knowledge about security and architectural security design. Yet, architectural knowledge on security design and its impact on other architectural properties is essential for making right decisions in architecture design. Knowledge is covered within solutions such as architectural patterns, tactics, and tools. Sharing it including the experience other architects gained using these solutions would enable better reuse of security solutions. In this paper, we present a repository for security solutions that supports architectural decisions including quality goal trade-offs. Its metamodel was adapted to special demands of security as a quality goal. The repository supports architecture decisions not only through populating approved solutions but through a recommender system that documents knowledge and experiences of architecture and security experts. We provide a case study to illustrate the repository's features and its application during architecture design.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"91 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131829718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards security metrics-supported IP traceback 迈向安全指标支持的IP回溯
Pub Date : 2016-11-28 DOI: 10.1145/2993412.2993416
R. Savola, Pekka T. Savolainen, J. Salonen
The threat of DDOS and other cyberattacks has increased during the last decade. In addition to the radical increase in the number of attacks, they are also becoming more sophisticated with the targets ranging from ordinary users to service providers and even critical infrastructure. According to some resources, the sophistication of attacks is increasing faster than the mitigating actions against them. For example determining the location of the attack origin is becoming impossible as cyber attackers employ specific means to evade detection of the attack origin by default, such as using proxy services and source address spoofing. The purpose of this paper is to initiate discussion about effective Internet Protocol traceback mechanisms that are needed to overcome this problem. We propose an approach for traceback that is based on extensive use of security metrics before (proactive) and during (reactive) the attacks.
DDOS和其他网络攻击的威胁在过去十年中有所增加。除了攻击数量急剧增加之外,它们也变得越来越复杂,目标从普通用户到服务提供商,甚至是关键的基础设施。根据一些资源,攻击的复杂程度比针对它们的缓解措施增长得更快。例如,确定攻击源的位置变得越来越不可能,因为网络攻击者默认使用特定的方法来逃避攻击源的检测,例如使用代理服务和源地址欺骗。本文的目的是开始讨论有效的互联网协议追溯机制,需要克服这一问题。我们提出了一种基于在攻击前(主动)和攻击期间(被动)广泛使用安全度量的追溯方法。
{"title":"Towards security metrics-supported IP traceback","authors":"R. Savola, Pekka T. Savolainen, J. Salonen","doi":"10.1145/2993412.2993416","DOIUrl":"https://doi.org/10.1145/2993412.2993416","url":null,"abstract":"The threat of DDOS and other cyberattacks has increased during the last decade. In addition to the radical increase in the number of attacks, they are also becoming more sophisticated with the targets ranging from ordinary users to service providers and even critical infrastructure. According to some resources, the sophistication of attacks is increasing faster than the mitigating actions against them. For example determining the location of the attack origin is becoming impossible as cyber attackers employ specific means to evade detection of the attack origin by default, such as using proxy services and source address spoofing. The purpose of this paper is to initiate discussion about effective Internet Protocol traceback mechanisms that are needed to overcome this problem. We propose an approach for traceback that is based on extensive use of security metrics before (proactive) and during (reactive) the attacks.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133362925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved information security situational awareness by manifold visualisation 通过多元可视化提高信息安全态势感知能力
Pub Date : 2016-11-28 DOI: 10.1145/2993412.2993413
Antti Evesti, C. Wieser, Tiandu Zhao
Security situational awareness is an essential building block in order to estimate security level of systems and to decide how to protect networked systems from cyber attacks. In this extended abstract we envision a model that combines results from security metrics to 3d network visualisation. The purpose is to apply security metrics to gather data from individual hosts. Simultaneously, the whole network is visualised in a 3d format, including network hosts and their connections. The proposed model makes it possible to offer enriched situational awareness for security administrators. This can be achieved by adding information pertaining to individual host into the network level 3d visualisation. Thus, administrator can see connected hosts and how the security of these hosts differs at one glance.
安全态势感知是评估系统安全水平和决定如何保护网络系统免受网络攻击的重要组成部分。在这个扩展的抽象中,我们设想了一个将安全度量结果与3d网络可视化相结合的模型。其目的是应用安全度量来收集来自各个主机的数据。同时,整个网络以3d格式可视化,包括网络主机及其连接。所提出的模型使为安全管理员提供丰富的态势感知成为可能。这可以通过将与单个主机相关的信息添加到网络级3d可视化中来实现。因此,管理员可以一目了然地看到连接的主机以及这些主机的安全性差异。
{"title":"Improved information security situational awareness by manifold visualisation","authors":"Antti Evesti, C. Wieser, Tiandu Zhao","doi":"10.1145/2993412.2993413","DOIUrl":"https://doi.org/10.1145/2993412.2993413","url":null,"abstract":"Security situational awareness is an essential building block in order to estimate security level of systems and to decide how to protect networked systems from cyber attacks. In this extended abstract we envision a model that combines results from security metrics to 3d network visualisation. The purpose is to apply security metrics to gather data from individual hosts. Simultaneously, the whole network is visualised in a 3d format, including network hosts and their connections. The proposed model makes it possible to offer enriched situational awareness for security administrators. This can be achieved by adding information pertaining to individual host into the network level 3d visualisation. Thus, administrator can see connected hosts and how the security of these hosts differs at one glance.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130763278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Supporting quality-driven architectural design decisions in software ecosystems 支持软件生态系统中质量驱动的架构设计决策
Pub Date : 2016-11-28 DOI: 10.1145/2993412.3003383
S. Stevanetic, Konstantinos Plakidas, Tudor B. Ionescu, D. Schall, Uwe Zdun
System quality attributes (QAs) are often considered as the most important decision drivers. In this paper, motivated by the decision making in a smart-city software ecosystem, we extend our previous approach that integrates reusable architectural design decisions (ADDs) with the QAs, by integrating tactics that support quality-driven decision making. In addition, we present an approach that enables system evolution, based on controlled and adaptable decision making and utilizing real data obtained during system monitoring. The approach integrates the previous approach that uses tactics with the existing model-driven development paradigm and the corresponding tools.
系统质量属性(qa)通常被认为是最重要的决策驱动因素。在本文中,受智慧城市软件生态系统决策的激励,我们扩展了之前的方法,通过集成支持质量驱动决策的策略,将可重用的架构设计决策(add)与qa集成在一起。此外,我们提出了一种方法,使系统进化,基于控制和适应性决策,并利用在系统监测期间获得的真实数据。该方法集成了前面的方法,该方法使用现有的模型驱动开发范例和相应的工具。
{"title":"Supporting quality-driven architectural design decisions in software ecosystems","authors":"S. Stevanetic, Konstantinos Plakidas, Tudor B. Ionescu, D. Schall, Uwe Zdun","doi":"10.1145/2993412.3003383","DOIUrl":"https://doi.org/10.1145/2993412.3003383","url":null,"abstract":"System quality attributes (QAs) are often considered as the most important decision drivers. In this paper, motivated by the decision making in a smart-city software ecosystem, we extend our previous approach that integrates reusable architectural design decisions (ADDs) with the QAs, by integrating tactics that support quality-driven decision making. In addition, we present an approach that enables system evolution, based on controlled and adaptable decision making and utilizing real data obtained during system monitoring. The approach integrates the previous approach that uses tactics with the existing model-driven development paradigm and the corresponding tools.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"1 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120900910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigating security threats using tactics and patterns: a controlled experiment 使用策略和模式减轻安全威胁:一个受控实验
Pub Date : 2016-11-28 DOI: 10.1145/2993412.3007552
G. Pedraza-Garcia, René Noël, S. Matalonga, H. Astudillo, E. Fernández
Security Patterns and Architectural Tactics are two well-known techniques for designing secure software systems. There is little or no empirical evidence on their relative effectiveness for security threats mitigation. This study presents MUA (Misuse activities + Patterns), an extension of misuse activities that incorporates patterns, and reports on a controlled comparison of this method that incorporate these techniques for threat mitigation with regard to MAST (Methodology for Applying Security Tactics) which already incorporates tactics. A simple Tsunami Alert System design was analyzed and modified by 40 undergraduate students, and significant difference was found for security threats mitigation (averaging 3.0 for Patterns versus 1.9 for Tactics, in a 1-to-5 scale). This result is contrary to previous results with professional subjects, leading us to believe that novices benefit more of detailed advice than of high-level concepts.
安全模式和体系结构策略是设计安全软件系统的两种众所周知的技术。很少或根本没有经验证据表明它们在缓解安全威胁方面的相对有效性。本研究提出了MUA(滥用活动+模式),这是一种包含模式的滥用活动的扩展,并报告了将这些用于缓解威胁的技术与已经包含策略的MAST(应用安全策略的方法论)进行对照比较的方法。40名本科生对一个简单的海啸警报系统设计进行了分析和修改,发现在安全威胁缓解方面存在显著差异(在1到5的量表中,模式平均为3.0分,战术平均为1.9分)。这一结果与之前专业科目的结果相反,使我们相信新手从详细的建议中获益比从高层次的概念中获益更多。
{"title":"Mitigating security threats using tactics and patterns: a controlled experiment","authors":"G. Pedraza-Garcia, René Noël, S. Matalonga, H. Astudillo, E. Fernández","doi":"10.1145/2993412.3007552","DOIUrl":"https://doi.org/10.1145/2993412.3007552","url":null,"abstract":"Security Patterns and Architectural Tactics are two well-known techniques for designing secure software systems. There is little or no empirical evidence on their relative effectiveness for security threats mitigation. This study presents MUA (Misuse activities + Patterns), an extension of misuse activities that incorporates patterns, and reports on a controlled comparison of this method that incorporate these techniques for threat mitigation with regard to MAST (Methodology for Applying Security Tactics) which already incorporates tactics. A simple Tsunami Alert System design was analyzed and modified by 40 undergraduate students, and significant difference was found for security threats mitigation (averaging 3.0 for Patterns versus 1.9 for Tactics, in a 1-to-5 scale). This result is contrary to previous results with professional subjects, leading us to believe that novices benefit more of detailed advice than of high-level concepts.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120957994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Designed and delivered today, eroded tomorrow?: towards an open and lean architecting framework balancing agility and sustainability 今天设计和交付,明天被侵蚀?朝着平衡敏捷性和可持续性的开放和精益架构框架发展
Pub Date : 2016-11-28 DOI: 10.1145/2993412.3014339
O. Zimmermann
Architecting for cost-effectiveness, longevity and endurance has multiple, often conflicting dimensions. For instance, agile practices emphasize the need for speed in software design, development and delivery, but do not necessarily prioritize mid- to long-term qualities such as extensibility and knowledge preservation. Risk- and cost-driven architecture design methods, pragmatic modeling, and technical debt management can help practicing architects to focus their efforts, but have to be tailored to be effective (e.g., according to project context, organizational constraints, and cultural factors). Architectural styles such as service-oriented architectures and its currently trending microservices incarnation promise to improve flexibility and maintainability through their principles and patterns, but still have to prove their cost-benefit efficiency in the long run (e.g., over the multi-decade lifetime of business information systems). This keynote presentation distills a set of open, lean and sustainable architecture practices and techniques from industrial experiences and existing work in the software architecture literature, and reports on the progress towards blending these practices and techniques into a comprehensive, yet comprehensible architecture framework. The featured assets include quality stories [1], C4 architecture modeling [2], decision sharing with Y-statements [3], architecturally evident coding styles [4], architectural refactoring [1], (micro-)services principles and patterns [5], and architecture roadmapping [6]. Examples drawn from actual case studies in multiple business sectors and industries demonstrate the applicability of these practices and techniques. The presentation concludes with a discussion of the changes to the role of the software architect in the digital age [7]. These ongoing changes drive the identification of research problems and challenges for the practical adoption and lasting impact of the practices and techniques in the framework (and other contributions to the body of knowledge on sustainable architectures).
为成本效益、寿命和耐久性进行架构设计有多个维度,而且常常是相互冲突的。例如,敏捷实践强调对软件设计、开发和交付速度的需求,但不一定优先考虑中长期质量,如可扩展性和知识保存。风险和成本驱动的架构设计方法、实用的建模和技术债务管理可以帮助实践架构师集中他们的努力,但是必须进行裁剪才能有效(例如,根据项目背景、组织约束和文化因素)。架构风格,如面向服务的架构及其当前流行的微服务,承诺通过它们的原则和模式来提高灵活性和可维护性,但仍然需要证明它们在长期运行(例如,在业务信息系统几十年的生命周期内)的成本效益效率。这个主题演讲从行业经验和软件架构文献中提炼出一组开放、精益和可持续的架构实践和技术,并报告了将这些实践和技术融合到一个全面的、可理解的架构框架中的进展。特色资产包括质量故事[1]、C4架构建模[2]、使用y语句进行决策共享[3]、架构上明显的编码风格[4]、架构重构[1]、(微)服务原则和模式[5]以及架构路线图[6]。从多个业务部门和行业的实际案例研究中得出的例子证明了这些实践和技术的适用性。报告最后讨论了软件架构师在数字时代的角色变化[7]。这些持续的变化推动了对研究问题和挑战的识别,这些问题和挑战是为了在框架中实践和技术的实际采用和持久影响(以及对可持续架构知识体系的其他贡献)。
{"title":"Designed and delivered today, eroded tomorrow?: towards an open and lean architecting framework balancing agility and sustainability","authors":"O. Zimmermann","doi":"10.1145/2993412.3014339","DOIUrl":"https://doi.org/10.1145/2993412.3014339","url":null,"abstract":"Architecting for cost-effectiveness, longevity and endurance has multiple, often conflicting dimensions. For instance, agile practices emphasize the need for speed in software design, development and delivery, but do not necessarily prioritize mid- to long-term qualities such as extensibility and knowledge preservation. Risk- and cost-driven architecture design methods, pragmatic modeling, and technical debt management can help practicing architects to focus their efforts, but have to be tailored to be effective (e.g., according to project context, organizational constraints, and cultural factors). Architectural styles such as service-oriented architectures and its currently trending microservices incarnation promise to improve flexibility and maintainability through their principles and patterns, but still have to prove their cost-benefit efficiency in the long run (e.g., over the multi-decade lifetime of business information systems). This keynote presentation distills a set of open, lean and sustainable architecture practices and techniques from industrial experiences and existing work in the software architecture literature, and reports on the progress towards blending these practices and techniques into a comprehensive, yet comprehensible architecture framework. The featured assets include quality stories [1], C4 architecture modeling [2], decision sharing with Y-statements [3], architecturally evident coding styles [4], architectural refactoring [1], (micro-)services principles and patterns [5], and architecture roadmapping [6]. Examples drawn from actual case studies in multiple business sectors and industries demonstrate the applicability of these practices and techniques. The presentation concludes with a discussion of the changes to the role of the software architect in the digital age [7]. These ongoing changes drive the identification of research problems and challenges for the practical adoption and lasting impact of the practices and techniques in the framework (and other contributions to the body of knowledge on sustainable architectures).","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Building multiple-viewpoint assurance cases using assumption/guarantee contracts 使用假设/担保合同构建多视点保证案例
Pub Date : 2016-11-28 DOI: 10.1145/2993412.3007555
Irfan Šljivo, B. Gallina
Assurance cases in form of structured arguments are often required by standards to show that a system is acceptable for its intended purpose with respect to a particular assurance viewpoint such as safety or security. The goal of such a case is to present an argument that connects the requirements of a particular viewpoint with the supporting evidence. Building a set of assurance cases for the different viewpoints can be time-consuming and costly. Means are needed to automate and reuse the assurance case artefacts between the assurance cases for the different viewpoints. In this paper we present how assumption/guarantee contracts can be used to facilitate reuse of assurance case artefacts by building multiple-viewpoint assurance cases from the contracts. More specifically, we build upon the previous work on argument-fragment generation from such contracts to allow for generating viewpoint specific argument-fragments. We illustrate the approach on a motivating case.
标准通常需要结构化论证形式的保证案例,以表明系统对于特定保证观点(如安全或保安)的预期目的是可接受的。这种情况的目标是提出一个论点,将特定观点的要求与支持证据联系起来。为不同的视点构建一组保证用例既耗时又昂贵。需要在不同视点的保证用例之间自动化和重用保证用例构件的方法。在本文中,我们展示了假设/保证契约如何通过从契约中构建多视点保证案例来促进保证案例工件的重用。更具体地说,我们建立在先前关于从此类契约生成参数片段的工作的基础上,以允许生成特定于视点的参数片段。我们用一个激励案例来说明这种方法。
{"title":"Building multiple-viewpoint assurance cases using assumption/guarantee contracts","authors":"Irfan Šljivo, B. Gallina","doi":"10.1145/2993412.3007555","DOIUrl":"https://doi.org/10.1145/2993412.3007555","url":null,"abstract":"Assurance cases in form of structured arguments are often required by standards to show that a system is acceptable for its intended purpose with respect to a particular assurance viewpoint such as safety or security. The goal of such a case is to present an argument that connects the requirements of a particular viewpoint with the supporting evidence. Building a set of assurance cases for the different viewpoints can be time-consuming and costly. Means are needed to automate and reuse the assurance case artefacts between the assurance cases for the different viewpoints. In this paper we present how assumption/guarantee contracts can be used to facilitate reuse of assurance case artefacts by building multiple-viewpoint assurance cases from the contracts. More specifically, we build upon the previous work on argument-fragment generation from such contracts to allow for generating viewpoint specific argument-fragments. We illustrate the approach on a motivating case.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123966126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Proccedings of the 10th European Conference on Software Architecture Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1