An Architecture-based Approach for Change Impact Analysis of Software-intensive Systems
Author: Busch, Kiana
Publisher: KIT Scientific Publishing
Published: 2020-03-19
Total Pages: 416
ISBN-13: 3731509741
DOWNLOAD EBOOKRead and Download eBook Full
Author: Busch, Kiana
Publisher: KIT Scientific Publishing
Published: 2020-03-19
Total Pages: 416
ISBN-13: 3731509741
DOWNLOAD EBOOKAuthor: Heinrich, Robert
Publisher: KIT Scientific Publishing
Published: 2023-06-05
Total Pages: 154
ISBN-13: 3731512947
DOWNLOAD EBOOKThis cumulative habilitation thesis, proposes concepts for (i) modelling and analysing dependability based on architectural models of software-intensive systems early in development, (ii) decomposition and composition of modelling languages and analysis techniques to enable more flexibility in evolution, and (iii) bridging the divergent levels of abstraction between data of the operation phase, architectural models and source code of the development phase.
Author: Frank, Markus Kilian
Publisher: KIT Scientific Publishing
Published: 2022-07-18
Total Pages: 400
ISBN-13: 3731511460
DOWNLOAD EBOOKDie modellbasierte Performancevorhersage ist ein bekanntes Konzept zur Gewährleistung der Softwarequalität. Derzeitige Ansätze basieren auf einem Modell mit einer Metrik, was zu ungenauen Vorhersagen für moderne Architekturen führt. In dieser Arbeit wird ein Multi-Strategie-Ansatz zur Erweiterung von Performancevorhersagemodellen zur Unterstützung von Multicore-Architekturen vorgestellt, in Palladio implementiert und dadurch die Genauigkeit der Vorhersage deutlich verbessert. - Model-based performance prediction is a well-known concept to ensure the quality of software. Current approaches are based on a single-metric model, which leads to inaccurate predictions for modern architectures. This thesis presents a multi-strategies approach to extend performance prediction models to support multicore architectures. We implemented the strategies into Palladio and significantly increased the performance prediction power.
Author: Walter, Maximilian
Publisher: KIT Scientific Publishing
Published: 2024-07-03
Total Pages: 350
ISBN-13: 3731513625
DOWNLOAD EBOOKThis work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development.
Author: Seifermann, Stephan
Publisher: KIT Scientific Publishing
Published: 2022-12-09
Total Pages: 412
ISBN-13: 3731512467
DOWNLOAD EBOOKSoftware vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Author: Koch, Sandro Giovanni
Publisher: KIT Scientific Publishing
Published: 2024-04-25
Total Pages: 398
ISBN-13: 3731513412
DOWNLOAD EBOOKIn this work, the authors analysed the co-dependency between models and analyses, particularly the structure and interdependence of artefacts and the feature-based decomposition and composition of model-based analyses. Their goal is to improve the maintainability of model-based analyses. They have investigated the co-dependency of Domain-specific Modelling Languages (DSMLs) and model-based analyses regarding evolvability, understandability, and reusability.
Author: Gotin, Manuel
Publisher: KIT Scientific Publishing
Published: 2022-06-30
Total Pages: 258
ISBN-13: 3731511479
DOWNLOAD EBOOKIoT applications perceive and interact with the environment via smart devices and cloud services. When operating such applications one is faced with the challenge of configuring the smart devices and the cloud services in a manner, which achieves a high data quality at low operational costs. This work supports IoT operators with IoT collection strategies and cost optimization functions for data qualities, which are influenced by the interplay of smart device and cloud service configurations.
Author: Ananieva, Sofia
Publisher: KIT Scientific Publishing
Published: 2022-12-06
Total Pages: 310
ISBN-13: 3731512416
DOWNLOAD EBOOKDeveloping variable systems faces many challenges. Dependencies between interrelated artifacts within a product variant, such as code or diagrams, across product variants and across their revisions quickly lead to inconsistencies during evolution. This work provides a unification of common concepts and operations for variability management, identifies variability-related inconsistencies and presents an approach for view-based consistency preservation of variable systems.
Author: Scheerer, Max
Publisher: KIT Scientific Publishing
Published: 2023-10-23
Total Pages: 472
ISBN-13: 373151320X
DOWNLOAD EBOOKAlthough tremendous progress has been made in Artificial Intelligence (AI), it entails new challenges. The growing complexity of learning tasks requires more complex AI components, which increasingly exhibit unreliable behaviour. In this book, we present a model-driven approach to model architectural safeguards for AI components and analyse their effect on the overall system reliability.
Author: Pilipchuk, Roman
Publisher: KIT Scientific Publishing
Published: 2023-01-27
Total Pages: 366
ISBN-13: 3731512122
DOWNLOAD EBOOKBusiness processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.