Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements


Book Description

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.




Architecture-based Evolution of Dependable Software-intensive Systems


Book Description

This cumulative habilitation thesis, proposes concepts for (i) modelling and analysing dependability based on architectural models of software-intensive systems early in development, (ii) decomposition and composition of modelling languages and analysis techniques to enable more flexibility in evolution, and (iii) bridging the divergent levels of abstraction between data of the operation phase, architectural models and source code of the development phase.




Evaluating Architectural Safeguards for Uncertain AI Black-Box Components


Book Description

Although tremendous progress has been made in Artificial Intelligence (AI), it entails new challenges. The growing complexity of learning tasks requires more complex AI components, which increasingly exhibit unreliable behaviour. In this book, we present a model-driven approach to model architectural safeguards for AI components and analyse their effect on the overall system reliability.




Context-based Access Control and Attack Modelling and Analysis


Book Description

This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development.




A Reference Structure for Modular Model-based Analyses


Book Description

In this work, the authors analysed the co-dependency between models and analyses, particularly the structure and interdependence of artefacts and the feature-based decomposition and composition of model-based analyses. Their goal is to improve the maintainability of model-based analyses. They have investigated the co-dependency of Domain-specific Modelling Languages (DSMLs) and model-based analyses regarding evolvability, understandability, and reusability.




Consistent View-Based Management of Variability in Space and Time


Book Description

Developing variable systems faces many challenges. Dependencies between interrelated artifacts within a product variant, such as code or diagrams, across product variants and across their revisions quickly lead to inconsistencies during evolution. This work provides a unification of common concepts and operations for variability management, identifies variability-related inconsistencies and presents an approach for view-based consistency preservation of variable systems.







Software Architecture


Book Description

This book constitutes the refereed proceedings of the 17th International Conference on Software Architecture, ECSA 2023, held in Istanbul, Turkey, in September 2023. The 16 full papers and the 9 short papers included in this volume were carefully reviewed and selected from 71 submissions. They address the most recent, innovative, and significant findings and experiences in the field of software architecture research and practice.




Business Process Management Workshops


Book Description

This book constitutes the refereed proceedings of 12 international workshops held in Tallinn, Estonia, in conjunction with the 10th International Conference on Business Process Management, BPM 2012, in September 2012. The 12 workshops comprised Adaptive Case Management and Other Non-Workflow Approaches to BPM (ACM 2012), Business Process Design (BPD 2012), Business Process Intelligence (BPI 2012), Business Process Management and Social Software (BPMS2 2012), Data- and Artifact-Centric BPM (DAB 2012), Event-Driven Business Process Management (edBPM 2012), Empirical Research in Business Process Management (ER-BPM 2012), Process Model Collections (PMC 2012), Process-Aware Logistics Systems (PALS 2012), Reuse in Business Process Management (rBPM 2012), Security in Business Processes (SBP 2012), and Theory and Applications of Process Visualization (TAProViz 2012). The 56 revised full papers presented were carefully reviewed and selected from 141 submissions.




Software Architecture


Book Description

This book constitutes the refereed proceedings of the tracks and workshops which complemented the 15th European Conference on Software Architecture, ECSA 2021, held in Växjö, Sweden*, in September 2021. The 15 full papers presented in this volume were carefully reviewed and selected from 17 submissions. Papers presented were accepted into the following tracks and workshops: Industry Track; DE&I - Diversity, Equity and Inclusion Track; SAEroCon - 8th Workshop on Software Architecture Erosion and Architectural Consistency; MSR4SA - 1st International Workshop on Mining Software Repositories for Software Architecture; SAML – 1st International Workshop on Software Architecture and Machine Learning; CASA - 4th Context-aware, Autonomous and Smart Architectures International Workshop; FAACS - 5th International Workshop on Formal Approaches for Advanced Computing Systems; MDE4SA - 2nd International Workshop on Model-Driven Engineering for Software Architecture; Tools and Demonstrations Track; Tutorial Track. *The conference was held virtually due to the COVID-19 pandemic.