Options
Requirements-driven runtime reconfiguration for security
Publikationstyp
Conference Paper
Publikationsdatum
2011-05
Sprache
English
First published in
Number in series
255
Start Page
25
End Page
33
Citation
Communications in Computer and Information Science 255: 25-33 (2012-08-27)
Contribution to Conference
Publisher DOI
Scopus ID
Publisher
Springer
The boundary between development time and run time of eternal software intensive applications is fading. In particular, these systems are characterized by the necessity to evolve requirements continuously, even after the deployment. In this paper we focus on the evolution of security requirements and introduce an integrated process to drive runtime reconfiguration from requirements changes. This process relies on two key proposals: systematic strategies to evolve architecture models according to security requirements evolution and the combination of reflective middleware and models@runtime for runtime reconfiguration.
Schlagworte
evolution
requirements
runtime
security
software architecture
DDC Class
004: Informatik