Skip to main content

Requirements-Driven Runtime Reconfiguration for Security

  • Conference paper
Eternal Systems (EternalS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 255))

Included in the following conference series:

Abstract

The boundary between development time and run time of eternal software intensive applications is fading. In particular, these systems are characterized by the necessity to evolve requirements continuously, even after the deployment. In this paper we focus on the evolution of security requirements and introduce an integrated process to drive runtime reconfiguration from requirements changes. This process relies on two key proposals: systematic strategies to evolve architecture models according to security requirements evolution and the combination of reflective middleware and models@runtime for runtime reconfiguration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bencomo, N., Grace, P., Flores, C., Hughes, D., Blair, G.: Genie: Supporting the model driven development of reflective, component-based adaptive systems. In: Proceedings of the 30th International Conference on Software Engineering, pp. 811–814. ACM (2008)

    Google Scholar 

  2. Garlan, D., Barnes, J., Schmerl, B., Celiku, O.: Evolution styles: Foundations and tool support for software architecture evolution. In: Proceedings of the Joint Working IEEE/IFIP Conference on Software Architecture 2009 & European Conference on Software Architecture 2009, pp. 131–140 (2009)

    Google Scholar 

  3. Ghezzi, C.: The fading boundary between development time and run time. Invited talk for the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (2011)

    Google Scholar 

  4. Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 237–272. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Kim, D., Kim, M., Kim, H.: Dynamic business process management based on process change patterns. In: International Conference on Convergence Information Technology, pp. 1154–1161. IEEE (2007)

    Google Scholar 

  6. Morin, B.: Leveraging Models from Design-time to Runtime to Support Dynamic Variability. Ph.D. thesis, cole doctorale Matisse (2010)

    Google Scholar 

  7. Morin, B., Ledoux, T., Ben Hassine, M., Chauvel, F., Barais, O., Jézéquel, J.M.: Unifying runtime adaptation and design evolution. In: IEEE 9th International Conference on Computer and Information Technology (CIT 2009), Xiamen, China (October 2009)

    Google Scholar 

  8. Muller, P.-A., Fleurey, F., Jézéquel, J.-M.: Weaving Executability into Object-Oriented Meta-Languages. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol. 3713, pp. 264–278. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Ráth, I., Varró, G., Varró, D.: Change-Driven Model Transformations. In: Schürr, A., Selic, B. (eds.) MODELS 2009. LNCS, vol. 5795, pp. 342–356. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Tamzalit, D., Mens, T.: Guiding Architectural Restructuring through Architectural Styles. In: 2010 17th IEEE International Conference and Workshops on Engineering of Computer-Based Systems, pp. 69–78. IEEE (2010)

    Google Scholar 

  11. Weber, B., Rinderle, S., Reichert, M.: Change Patterns and Change Support Features in Process-Aware Information Systems. In: Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007 and WES 2007. LNCS, vol. 4495, pp. 574–588. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yskout, K., Ben David, ON., Scandariato, R., Baudry, B. (2012). Requirements-Driven Runtime Reconfiguration for Security. In: Moschitti, A., Scandariato, R. (eds) Eternal Systems. EternalS 2011. Communications in Computer and Information Science, vol 255. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28033-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28033-7_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28032-0

  • Online ISBN: 978-3-642-28033-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics