Abstract
The boundary between development time and run time of eternal software intensive applications is fading. In particular, these systems are characterized by the necessity to evolve requirements continuously, even after the deployment. In this paper we focus on the evolution of security requirements and introduce an integrated process to drive runtime reconfiguration from requirements changes. This process relies on two key proposals: systematic strategies to evolve architecture models according to security requirements evolution and the combination of reflective middleware and models@runtime for runtime reconfiguration.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bencomo, N., Grace, P., Flores, C., Hughes, D., Blair, G.: Genie: Supporting the model driven development of reflective, component-based adaptive systems. In: Proceedings of the 30th International Conference on Software Engineering, pp. 811–814. ACM (2008)
Garlan, D., Barnes, J., Schmerl, B., Celiku, O.: Evolution styles: Foundations and tool support for software architecture evolution. In: Proceedings of the Joint Working IEEE/IFIP Conference on Software Architecture 2009 & European Conference on Software Architecture 2009, pp. 131–140 (2009)
Ghezzi, C.: The fading boundary between development time and run time. Invited talk for the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (2011)
Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 237–272. Springer, Heidelberg (2005)
Kim, D., Kim, M., Kim, H.: Dynamic business process management based on process change patterns. In: International Conference on Convergence Information Technology, pp. 1154–1161. IEEE (2007)
Morin, B.: Leveraging Models from Design-time to Runtime to Support Dynamic Variability. Ph.D. thesis, cole doctorale Matisse (2010)
Morin, B., Ledoux, T., Ben Hassine, M., Chauvel, F., Barais, O., Jézéquel, J.M.: Unifying runtime adaptation and design evolution. In: IEEE 9th International Conference on Computer and Information Technology (CIT 2009), Xiamen, China (October 2009)
Muller, P.-A., Fleurey, F., Jézéquel, J.-M.: Weaving Executability into Object-Oriented Meta-Languages. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol. 3713, pp. 264–278. Springer, Heidelberg (2005)
Ráth, I., Varró, G., Varró, D.: Change-Driven Model Transformations. In: Schürr, A., Selic, B. (eds.) MODELS 2009. LNCS, vol. 5795, pp. 342–356. Springer, Heidelberg (2009)
Tamzalit, D., Mens, T.: Guiding Architectural Restructuring through Architectural Styles. In: 2010 17th IEEE International Conference and Workshops on Engineering of Computer-Based Systems, pp. 69–78. IEEE (2010)
Weber, B., Rinderle, S., Reichert, M.: Change Patterns and Change Support Features in Process-Aware Information Systems. In: Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007 and WES 2007. LNCS, vol. 4495, pp. 574–588. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yskout, K., Ben David, ON., Scandariato, R., Baudry, B. (2012). Requirements-Driven Runtime Reconfiguration for Security. In: Moschitti, A., Scandariato, R. (eds) Eternal Systems. EternalS 2011. Communications in Computer and Information Science, vol 255. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28033-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-28033-7_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28032-0
Online ISBN: 978-3-642-28033-7
eBook Packages: Computer ScienceComputer Science (R0)