Yskout, KoenKoenYskoutBen David, Olivier NathanaelOlivier NathanaelBen DavidScandariato, RiccardoRiccardoScandariatoBaudry, BenoitBenoitBaudry2023-03-102023-03-102011-05Communications in Computer and Information Science 255: 25-33 (2012-08-27)http://hdl.handle.net/11420/14969The boundary between development time and run time of eternal software intensive applications is fading. In particular, these systems are characterized by the necessity to evolve requirements continuously, even after the deployment. In this paper we focus on the evolution of security requirements and introduce an integrated process to drive runtime reconfiguration from requirements changes. This process relies on two key proposals: systematic strategies to evolve architecture models according to security requirements evolution and the combination of reflective middleware and models@runtime for runtime reconfiguration.enevolutionrequirementsruntimesecuritysoftware architectureInformatikRequirements-driven runtime reconfiguration for securityConference Paper10.1007/978-3-642-28033-7_3Other