skip to main content
10.1145/1404946.1404947acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Multi-step concern refinement

Published:31 March 2008Publication History

ABSTRACT

A Model-Driven Software Product Line (MD-SPL) uses metamodels, models, and transformations to create a family of products using a Model Refinement Line (MRL). However, an MD-SPL must evolve and provide mechanisms to add new crosscutting concerns, such as security or logging, to the applications. Our problem is that we want to preserve and reuse the original MRL. In this paper, we present the challenges associated with this problem. We illustrate them by evaluating different model-driven approaches to add crosscutting concerns into an application using high-level aspects. Furthermore, we propose an approach to add crosscutting concerns as early aspects and to preserve the original MRL. This approach adds a new MRL that refines a high-level model of the concern. This high-level model is related with the high-level application model in the original MRL. The refinement of the application model and the concern model proceeds in parallel. The presented approach is a work in progress and requires us to tackle several challenges in order to implement and validate the proposal.

References

  1. P. Clements, L. Northrop, Software Product Lines: Practices and Patterns, 2002.Google ScholarGoogle Scholar
  2. D. C. Schmidt, Guest Editor's Introduction: Model-Driven Engineering, Computer, p25-p31, February 2006, Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. K. Garcés, C. Parra, H. Arboleda, A. Yie, R. Casallas, Variability Management in a Model-Driven Software Product Line, Revista Avances en Sistemas e Informática, Vol. 4 No. 2, 2007Google ScholarGoogle Scholar
  4. AOSD: Aspect-Oriented Software Development Community website: http://www.aosd.net/Google ScholarGoogle Scholar
  5. F. Klar, A. Königs, A. Schürr, Model transformation in the large, Proceedings of the 6th joint meeting of the european software engineering conference, Dubrovnik, Croatia, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Basin, J. Doser, T. Lodderstedt, Model-driven security: From UML models to access control infrastructures, ACM Transactions on Software Engineering and Methodology (TOSEM) Vol. 15, No. 1 p39--p91, 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Fabry, Modularizing Advanced Transaction Management, Phd Dissertation, Vrije Universiteit Brussel, 2005Google ScholarGoogle Scholar
  8. M. A. Cibrán, Connecting High-Level Business Rules with Object-Oriented Applications: An approach using Aspect-Oriented Programming and Model-Driven Engineering, Phd Dissertation, Vrije Universiteit Brussel, 2007Google ScholarGoogle Scholar
  9. J. Fabry, T. Cleenewerck, Aspect-oriented domain-specific languages for advanced transaction management, Proceedings of International Conference on Enterprise Information Systems, Miami, USA, 2005Google ScholarGoogle Scholar
  10. D. Rebernak, M. Mernik, H. Wu, J. Gray, Domain-Specific Aspect Languages for Modularizing Crosscutting Concerns in Grammars, First Domain-Specific Aspect Languages Workshop, Portland, USA, 2006Google ScholarGoogle Scholar
  11. AspectJ website: http://www.eclipse.org/aspectj/Google ScholarGoogle Scholar

Index Terms

  1. Multi-step concern refinement

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          EA '08: Proceedings of the 2008 AOSD workshop on Early aspects
          March 2008
          52 pages
          ISBN:9781605581439
          DOI:10.1145/1404946

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 31 March 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader