ABSTRACT
The TRIDENT ARCHITECTURAL VIEWS pattern is a systematic approach to architecting complex dependable systems. While engineering system functionality through several steps of refinement with full traceability is well established, dependability attributes like functional safety and IT security are hard to control during the creative steps of design. TRIDENT ARCHITECTURAL VIEWS has been mined primarily from best practices in engineering of systems exhibiting functional safety. It provides a three-view framework with Functional, Element, and Composition together with nine relations that guide architecture work for dependable systems.
- Bozzano, M. and Villafiorita, A. 2011. Design and Safety Assessment of Critical Systems. Auerbach. Google ScholarDigital Library
- Crnkovic, I., Sentilles, S., Aneta, V., and Chaudron, M. R. 2011. A Classification Framework for Software Component Models. IEEE Transactions on Software Engineering 37, 5. Google ScholarDigital Library
- Höhn, H., Sechser, B., Dussa-Zieger, K., Messnarz, R., and Hindel, B. 2009. Software Engineering nach Automotive SPICE (german). dpunkt.Verlag.Google Scholar
- IEC 60812. 1985. Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA).Google Scholar
- IEC 61508. 2010. IEC 61508, Functional Safety of Electrical/Electronic/Programmable Electronic Safety Related Systems.Google Scholar
- IEEE 1471. 2000. IEEE Recommended Practice for Architectural Description for Software-Intensive Systems.Google Scholar
- ISO 13053. 2011. ISO 13053 Quantitative methods in process improvement -- Six Sigma -- Part 1--2.Google Scholar
- ISO 15504. 2004--2012. ISO 15504 -- Information technology -- Process assessment -- Part 1--10.Google Scholar
- ISO 26262. 2011. ISO 26262 -- Road vehicles -- Functional safety -- Part 1--10.Google Scholar
- ISO/IEC 12207. 2008. Systems and software engineering -- Software life cycle processes.Google Scholar
- ISO/IEC 12288. 2015. Systems and software engineering -- System life cycle processes.Google Scholar
- ISO/IEC 15408:2009(E). 2009. Information technology -- Security Techniques -- Evaluation criteria for IT security.Google Scholar
- ISO/IEC/IEEE 42010. 2011. ISO/IEC/IEEE 42010:2011 Systems and software engineering -- Architecture description.Google Scholar
- Kreiner, C., Messnarz, R., Riel, A., Ekert, D., Langgner, M., Theisens, D., and Reiner, M. 2013. Automotive Knowledge Alliance AQUA -Integrating Automotive SPICE, Six Sigma, and Functional Safety. In Systems, Software and Services Process Improvement, Fergal McCaffery and Rory O'Connor and Richard Messnarz, Ed. Communications in Computer and Information Science Series, vol. 364. Springer Berlin Heidelberg, 333--344.Google Scholar
- Kruchten, P. 1995. Architectural blueprints -- the "4+1" view model of software architecture. IEEE Software 12, 6. Google ScholarDigital Library
- SPICE User Group. 2010. Automotive SPICE Process Assessment Model. Tech. rep.Google Scholar
- VDA standards. 2012. VDA 4 - chapter FMEA. Product and Process FMEA.Google Scholar
Index Terms
- Trident architectural views: a pattern for dependable systems design
Recommendations
Towards a reliable mapping between performance and security tactics, and architectural patterns
EuroPLoP '15: Proceedings of the 20th European Conference on Pattern Languages of ProgramsThe software architecture of a system-to-be affects the fulfillment of the desired quality requirements for this system. For building upon common knowledge and best practices, the use of architectural patterns in the software architecture has shown to ...
Reconstructing Architectural Views from Legacy Systems
WCRE '12: Proceedings of the 2012 19th Working Conference on Reverse EngineeringModernizing a large legacy system is a demanding and costly process which requires a deep understanding of the systemâ s architecture and its components. However legacy systems are poorly documented and they have often undergone many changes that make ...
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
The Internet has become essential to all aspects of modern life, and thus the consequences of network disruption have become increasingly severe. It is widely recognised that the Internet is not sufficiently resilient, survivable, and dependable, and ...
Comments