Proccedings of the 10th European Conference on Software Architecture Workshops最新文献

筛选
英文 中文
Meta-model based framework for architectural knowledge management 基于元模型的架构知识管理框架
Proccedings of the 10th European Conference on Software Architecture Workshops Pub Date : 2016-11-28 DOI: 10.1145/2993412.3004848
Manoj Bhat, Klym Shumaiev, A. Biesdorf, U. Hohenstein, Michael Hassel, F. Matthes
{"title":"Meta-model based framework for architectural knowledge management","authors":"Manoj Bhat, Klym Shumaiev, A. Biesdorf, U. Hohenstein, Michael Hassel, F. Matthes","doi":"10.1145/2993412.3004848","DOIUrl":"https://doi.org/10.1145/2993412.3004848","url":null,"abstract":"The need to support a software architect's day-to-day activities through efficient tool support has been highlighted both in research and industry. However, managing enterprises' Architectural Knowledge (AK) to support scenarios such as decision making, what-if analysis, and collaboration during the execution of large industrial projects is still a challenge. In this paper, we propose the architecture of an AK management framework to support software architects to manage AK. The components of this framework including SyncPipes and rule engine allow software architects to consolidate projects' data from disparate sources and to define domain-specific rules to address the challenges in inconsistency analysis, context-sensitive recommendations, and tracking of artifacts within projects. The technical details for realizing the components of the framework are also presented. The proposed AK management framework has been successfully implemented as part of an industrial project and is currently being evaluated in different domains.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"54 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Architectural management of on-the-fly computing markets 动态计算市场的体系结构管理
Proccedings of the 10th European Conference on Software Architecture Workshops Pub Date : 2016-11-28 DOI: 10.1145/2993412.3010821
B. Jazayeri
{"title":"Architectural management of on-the-fly computing markets","authors":"B. Jazayeri","doi":"10.1145/2993412.3010821","DOIUrl":"https://doi.org/10.1145/2993412.3010821","url":null,"abstract":"Existing software markets like Google Play allow users to search among available Apps and select one based on the description provided for the App or based on its rating. Future software markets facilitate on-the-fly composition of such Apps based on users' individual wishes. Realizing such On-The-Fly Computing (OTF) markets requires support of sophisticated software features. In addition, suitable orchestration among such features needs to ensure well-alignment of business and IT aspects in case of run-time changes like market dynamics. However, all these introduce new architectural and management complexities, which are specific to such markets. An architecture framework for OTF markets will include design solutions to overcome these complexities. In my PhD, I aim at identifying an architecture framework for OTF markets including main architectural building blocks and a systematic development process. Such an architecture framework enables the development of OTF markets in the future. Furthermore, this knowledge can be used as a basis to improve existing software markets by integrating missing functionalities.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Compromise-protection of smart meters in the smart grid using co-dependent authentication 使用共同依赖认证的智能电网中智能电表的折衷保护
Proccedings of the 10th European Conference on Software Architecture Workshops Pub Date : 2016-11-28 DOI: 10.1145/2993412.2993418
Sigurd Eskeland
{"title":"Compromise-protection of smart meters in the smart grid using co-dependent authentication","authors":"Sigurd Eskeland","doi":"10.1145/2993412.2993418","DOIUrl":"https://doi.org/10.1145/2993412.2993418","url":null,"abstract":"Today, smart meters are being employed on a large scale. However, there exist a number of security threats to smart meters, whereof some can be countermeasured by means of cryptographic techniques, which requires storage of cryptographic keys in smart meters. However, relevant threats include compromise of stored cryptographic keys, which would provision an adversary to control smart meters. In this paper, we propose the novel concept co-dependent message authentication, whose purpose is to prevent such attacks from succeeding. We then show a realization of this by means of threshold cryptography, which distributes the authentication process of received messages and commands to several co-located smart meters. Hence, if a smart meter is compromised, co-dependent message authentication will prevent that smart meter from accepting fraudulent commands originating from an adversary.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121809232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research contributions on adaptive software architectures: a Brazilian female perspective at UNICAMP 自适应软件架构的研究贡献:UNICAMP的巴西女性视角
Proccedings of the 10th European Conference on Software Architecture Workshops Pub Date : 2016-11-28 DOI: 10.1145/2993412.3004851
S. K. Venero, J. D. A. S. Eleutério, C. M. F. Rubira
{"title":"Research contributions on adaptive software architectures: a Brazilian female perspective at UNICAMP","authors":"S. K. Venero, J. D. A. S. Eleutério, C. M. F. Rubira","doi":"10.1145/2993412.3004851","DOIUrl":"https://doi.org/10.1145/2993412.3004851","url":null,"abstract":"The percentage of women in Computer Science in Brazil drops every year. In the Institute of Computing at the University of Campinas, we have a group, called Computing4all, that aims to increase diversity in Computer Science. Similarly, in the area of Software Architecture, the number of women remains disproportionately small. In particular, our former predominantly male research group has started to grow in its diversity, three girls are now part of our team. This paper presents three recent approaches developed by female graduate students in the research area of software architecture. These solutions apply the principles of self-adaptive systems and autonomic computing to achieve adaptation in the development of Dynamic Software Product Lines and Workflow Management Systems.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133719827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards tool-based security-informed safety oriented process line engineering 以工具为基础,以安全为导向的工艺线工程
Proccedings of the 10th European Conference on Software Architecture Workshops Pub Date : 2016-11-28 DOI: 10.1145/2993412.3007554
I. Ayala, B. Gallina
{"title":"Towards tool-based security-informed safety oriented process line engineering","authors":"I. Ayala, B. Gallina","doi":"10.1145/2993412.3007554","DOIUrl":"https://doi.org/10.1145/2993412.3007554","url":null,"abstract":"For the purpose of certification, manufactures of nowadays highly connected safety-critical systems are expected to engineer their systems according to well-defined engineering processes in compliance with safety and security standards. Certification is an extremely expensive and time-consuming process. Since safety and security standards exhibit a certain degree of commonality, certification-related artifacts (e.g., process models) should to some extent be reusable. To enable systematic reuse and customization of process information, in this paper we further develop security-informed safety-oriented process line engineering (i.e., engineering of sets of processes including security and safety concerns). More specifically, first we consider three tool-supported approaches for process-related commonality and variability management and we apply them to limited but meaningful portions of safety and security standards within airworthiness. Then, we discuss our findings. Finally, we draw our conclusions and sketch future work.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132733580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A genetic approach to architectural pattern discovery 架构模式发现的遗传方法
Proccedings of the 10th European Conference on Software Architecture Workshops Pub Date : 2016-11-28 DOI: 10.1145/2993412.3003393
J. Peters, J. V. D. Werf
{"title":"A genetic approach to architectural pattern discovery","authors":"J. Peters, J. V. D. Werf","doi":"10.1145/2993412.3003393","DOIUrl":"https://doi.org/10.1145/2993412.3003393","url":null,"abstract":"Architectural patterns represent reusable design of software architecture at a high level of abstraction. They can be used to structure new applications and to recover the modular structure of existing systems. Techniques like Architecture Compliance Checking (ACC) focus on testing whether realised artefacts adhere to the architecture. Typically, these techniques require a complete architecture as input. In this paper, we present a genetic approach to express and discover architectural patterns based on the allowed and disallowed dependencies between the pattern elements. Through static ACC, we validate the genuineness of the found instances. Initial validation shows the potential of the approach.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132734607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Associating architectural issues with quality attributes: a survey on expert agreement 将架构问题与质量属性联系起来:关于专家共识的调查
Proccedings of the 10th European Conference on Software Architecture Workshops Pub Date : 2016-11-28 DOI: 10.1145/2993412.3004847
Mohsen Anvaari, Carl-Fredrik Sørensen, O. Zimmermann
{"title":"Associating architectural issues with quality attributes: a survey on expert agreement","authors":"Mohsen Anvaari, Carl-Fredrik Sørensen, O. Zimmermann","doi":"10.1145/2993412.3004847","DOIUrl":"https://doi.org/10.1145/2993412.3004847","url":null,"abstract":"The architectural decision-making process is a complex and crucial endeavor in companies that develop large and distributed software systems. In this process, choosing and evaluating a solution for each architectural issue depends on decision drivers. The drivers are mainly the business factors (e.g., cost, time-to-market, etc.) and software quality attributes (e.g., security, adaptability, etc.). This paper examines whether there is agreement among experts in associating (i.e., relating) architectural issues with relevant quality attributes. We conducted a survey with 37 experts from several industrial domains who, at least once a month, make one or more architectural decisions. The results show there is poor agreement among these experts in identifying and scoring relevant quality attributes for each architectural issue. Poor agreement implies that the associating task is subjective, and that experts inconsistently define and interpret the relevance of various quality attributes for a given architectural issue that may hurt the sustainability of their architectural decisions. This paper suggests that practitioners in their decision-making should employ approaches that are more systematic. The approaches should be supported by methods and tools designed to diminish the biases of intuitive, experience-based approaches of associating architectural issues with quality attributes.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129753217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Correlating file-based malware graphs against the empirical ground truth of DNS graphs 将基于文件的恶意软件图与DNS图的经验基础事实相关联
Proccedings of the 10th European Conference on Software Architecture Workshops Pub Date : 2016-11-28 DOI: 10.1145/2993412.2993414
Jukka Ruohonen, S. Šćepanović, S. Hyrynsalmi, I. Mishkovski, T. Aura, V. Leppänen
{"title":"Correlating file-based malware graphs against the empirical ground truth of DNS graphs","authors":"Jukka Ruohonen, S. Šćepanović, S. Hyrynsalmi, I. Mishkovski, T. Aura, V. Leppänen","doi":"10.1145/2993412.2993414","DOIUrl":"https://doi.org/10.1145/2993412.2993414","url":null,"abstract":"This exploratory empirical paper investigates whether the sharing of unique malware files between domains is empirically associated with the sharing of Internet Protocol (IP) addresses and the sharing of normal, non-malware files. By utilizing a graph theoretical approach with a web crawling dataset from F-Secure, the paper finds no robust statistical associations, however. Unlike what might be expected from the still continuing popularity of shared hosting services, the sharing of IP addresses through the domain name system (DNS) seems to neither increase nor decrease the sharing of malware files. In addition to these exploratory empirical results, the paper contributes to the field of DNS mining by elaborating graph theoretical representations that are applicable for analyzing different network forensics problems.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130619359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Aligning architectures for sustainability 调整架构以实现可持续性
Proccedings of the 10th European Conference on Software Architecture Workshops Pub Date : 2016-11-28 DOI: 10.1145/2993412.3004849
J. Andersson, M. Caporuscio
{"title":"Aligning architectures for sustainability","authors":"J. Andersson, M. Caporuscio","doi":"10.1145/2993412.3004849","DOIUrl":"https://doi.org/10.1145/2993412.3004849","url":null,"abstract":"The digitization of industry has drastically changed the competitive landscape by requiring a higher degree of specialization and shorter time to delivery that affect the design properties a software platform should satisfy. The platform architecture must sustain continuous and rapid change to the organizational architecture, which in turn is affected by external forces: i.e., forces drive the velocity of change. In this paper, we explore the effects of digitization, characterizing internal and external forces that impact on business strategies and trigger the continuous realignment of the platform, and outline a research agenda to mitigate the effects.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116488694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Social and technical evolution of software ecosystems: a case study of rails 软件生态系统的社会和技术演变:rails的案例研究
Proccedings of the 10th European Conference on Software Architecture Workshops Pub Date : 2016-11-28 DOI: 10.1145/2993412.3003384
Eleni Constantinou, T. Mens
{"title":"Social and technical evolution of software ecosystems: a case study of rails","authors":"Eleni Constantinou, T. Mens","doi":"10.1145/2993412.3003384","DOIUrl":"https://doi.org/10.1145/2993412.3003384","url":null,"abstract":"Software ecosystems evolve through an active community of developers who contribute to projects within the ecosystem. However, development teams change over time, suggesting a potential impact on the evolution of the technical parts of the ecosystem. The impact of such modifications has been studied by previous works, but only temporary changes have been investigated, while the long-term effect of permanent changes has yet to be explored. In this paper, we investigate the evolution of the ecosystem of Ruby on Rails in GitHub in terms of such temporary and permanent changes of the development team. We use three viewpoints of the Rails ecosystem evolution to discuss our preliminary findings: (1) the base project; (2) the forks; and (3) the entire ecosystem containing both base project and forks.","PeriodicalId":409631,"journal":{"name":"Proccedings of the 10th European Conference on Software Architecture Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129093403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信