Author: Lehrig, Sebastian Michael
Publisher: KIT Scientific Publishing
ISBN: 3731507560
Category : Architects
Languages : en
Pages : 552
Book Description
Previously, software architects were unable to effectively and efficiently apply reusable knowledge (e.g., architectural styles and patterns) to architectural analyses. This work tackles this problem with a novel method to create and apply templates for reusable knowledge. These templates capture reusable knowledge formally and can efficiently be integrated in architectural analyses.
Efficiently Conducting Quality-of-Service Analyses by Templating Architectural Knowledge
Author: Lehrig, Sebastian Michael
Publisher: KIT Scientific Publishing
ISBN: 3731507560
Category : Architects
Languages : en
Pages : 552
Book Description
Previously, software architects were unable to effectively and efficiently apply reusable knowledge (e.g., architectural styles and patterns) to architectural analyses. This work tackles this problem with a novel method to create and apply templates for reusable knowledge. These templates capture reusable knowledge formally and can efficiently be integrated in architectural analyses.
Publisher: KIT Scientific Publishing
ISBN: 3731507560
Category : Architects
Languages : en
Pages : 552
Book Description
Previously, software architects were unable to effectively and efficiently apply reusable knowledge (e.g., architectural styles and patterns) to architectural analyses. This work tackles this problem with a novel method to create and apply templates for reusable knowledge. These templates capture reusable knowledge formally and can efficiently be integrated in architectural analyses.
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
Author: Seifermann, Stephan
Publisher: KIT Scientific Publishing
ISBN: 3731512467
Category : Computers
Languages : en
Pages : 412
Book Description
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Publisher: KIT Scientific Publishing
ISBN: 3731512467
Category : Computers
Languages : en
Pages : 412
Book Description
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
An Architecture-based Approach for Change Impact Analysis of Software-intensive Systems
Author: Busch, Kiana
Publisher: KIT Scientific Publishing
ISBN: 3731509741
Category : Computers
Languages : en
Pages : 416
Book Description
Publisher: KIT Scientific Publishing
ISBN: 3731509741
Category : Computers
Languages : en
Pages : 416
Book Description
QoS-Based Optimization of Runtime Management of Sensing Cloud Applications
Author: Gotin, Manuel
Publisher: KIT Scientific Publishing
ISBN: 3731511479
Category : Computers
Languages : en
Pages : 258
Book Description
IoT applications perceive and interact with the environment via smart devices and cloud services. When operating such applications one is faced with the challenge of configuring the smart devices and the cloud services in a manner, which achieves a high data quality at low operational costs. This work supports IoT operators with IoT collection strategies and cost optimization functions for data qualities, which are influenced by the interplay of smart device and cloud service configurations.
Publisher: KIT Scientific Publishing
ISBN: 3731511479
Category : Computers
Languages : en
Pages : 258
Book Description
IoT applications perceive and interact with the environment via smart devices and cloud services. When operating such applications one is faced with the challenge of configuring the smart devices and the cloud services in a manner, which achieves a high data quality at low operational costs. This work supports IoT operators with IoT collection strategies and cost optimization functions for data qualities, which are influenced by the interplay of smart device and cloud service configurations.
Quality-driven Reuse of Model-based Software Architecture Elements
Author: Busch, Axel
Publisher: KIT Scientific Publishing
ISBN: 3731509512
Category : Computers
Languages : en
Pages : 444
Book Description
Publisher: KIT Scientific Publishing
ISBN: 3731509512
Category : Computers
Languages : en
Pages : 444
Book Description
A Reference Structure for Modular Model-based Analyses
Author: Koch, Sandro Giovanni
Publisher: KIT Scientific Publishing
ISBN: 3731513412
Category :
Languages : en
Pages : 398
Book Description
In this work, the authors analysed the co-dependency between models and analyses, particularly the structure and interdependence of artefacts and the feature-based decomposition and composition of model-based analyses. Their goal is to improve the maintainability of model-based analyses. They have investigated the co-dependency of Domain-specific Modelling Languages (DSMLs) and model-based analyses regarding evolvability, understandability, and reusability.
Publisher: KIT Scientific Publishing
ISBN: 3731513412
Category :
Languages : en
Pages : 398
Book Description
In this work, the authors analysed the co-dependency between models and analyses, particularly the structure and interdependence of artefacts and the feature-based decomposition and composition of model-based analyses. Their goal is to improve the maintainability of model-based analyses. They have investigated the co-dependency of Domain-specific Modelling Languages (DSMLs) and model-based analyses regarding evolvability, understandability, and reusability.
Context-based Access Control and Attack Modelling and Analysis
Author: Walter, Maximilian
Publisher: KIT Scientific Publishing
ISBN: 3731513625
Category :
Languages : en
Pages : 350
Book Description
This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development.
Publisher: KIT Scientific Publishing
ISBN: 3731513625
Category :
Languages : en
Pages : 350
Book Description
This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development.
A Reference Structure for Modular Metamodels of Quality-Describing Domain-Specific Modeling Languages
Author: Strittmatter, Misha
Publisher: KIT Scientific Publishing
ISBN: 3731509822
Category : Computers
Languages : en
Pages : 518
Book Description
Publisher: KIT Scientific Publishing
ISBN: 3731509822
Category : Computers
Languages : en
Pages : 518
Book Description
Evaluating Architectural Safeguards for Uncertain AI Black-Box Components
Author: Scheerer, Max
Publisher: KIT Scientific Publishing
ISBN: 373151320X
Category :
Languages : en
Pages : 472
Book Description
Although tremendous progress has been made in Artificial Intelligence (AI), it entails new challenges. The growing complexity of learning tasks requires more complex AI components, which increasingly exhibit unreliable behaviour. In this book, we present a model-driven approach to model architectural safeguards for AI components and analyse their effect on the overall system reliability.
Publisher: KIT Scientific Publishing
ISBN: 373151320X
Category :
Languages : en
Pages : 472
Book Description
Although tremendous progress has been made in Artificial Intelligence (AI), it entails new challenges. The growing complexity of learning tasks requires more complex AI components, which increasingly exhibit unreliable behaviour. In this book, we present a model-driven approach to model architectural safeguards for AI components and analyse their effect on the overall system reliability.
Architectural Alignment of Access Control Requirements Extracted from Business Processes
Author: Pilipchuk, Roman
Publisher: KIT Scientific Publishing
ISBN: 3731512122
Category : Computers
Languages : en
Pages : 366
Book Description
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.
Publisher: KIT Scientific Publishing
ISBN: 3731512122
Category : Computers
Languages : en
Pages : 366
Book Description
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.