Software Product Lines 2006
DOI: 10.1007/978-3-540-33253-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Architecture Reasoning for Supporting Product Line Evolution: An Example on Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 33 publications
0
16
0
Order By: Relevance
“…The ''Architecture reasoning for supporting SPL evolution" approach of Arciniegas et al [3] proposes a new process to support SPL evolution which involves architecture recovery and conformance methods and a set of techniques and tools to support them. The authors also present a case study dealing with non-functional security requirements in distributed environments through which to create a reference architecture.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The ''Architecture reasoning for supporting SPL evolution" approach of Arciniegas et al [3] proposes a new process to support SPL evolution which involves architecture recovery and conformance methods and a set of techniques and tools to support them. The authors also present a case study dealing with non-functional security requirements in distributed environments through which to create a reference architecture.…”
Section: Related Workmentioning
confidence: 99%
“…The few recent proposals which deal with security in SPLs, such as [3,16], focus mainly on the design of implementation aspects of SPL development or include only a few security requirements activities. After analysing the most relevant current ''generic" security requirements related proposals in [44], we can conclude that none of them are either sufficiently specific or are tailored to the SPL development paradigm.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, there are approaches focused on the security as a use case, such as in [36] and the methodology SecPL [37] is proposed to specify the security requirements and product-line variability. These are annotated in the design model of any system.…”
Section: Cybersecurity and Software Product Linesmentioning
confidence: 99%
“…For example, reverse engineering tools are used to automatically create architectural and other models based on code. This is especially useful in the context of open source software that is seldom accompanied by detailed design models [2]. The capabilities of reverse engineering tools to generate product line models with explicitly defined variability from application code are limited partly because much of the variability has typically been resolved by the time the code has been created.…”
Section: Machine To Human Communicationmentioning
confidence: 99%
“…Open-source UML tools are not yet as mature as their commercial counterparts are but they have reached a sufficient maturity level to benefit small and medium sized businesses [26]. We chose the two tools for evaluation because they (1) are available for Macintosh, Linux and Windows operating systems, (2) are not too expensive for a large company to deploy for even thousands of users, (3) support SysML, and (4) provide version management features. These four criteria are adequate to simulate a situation where a large company is looking for a UML modeling tool for organization-wide use by both systems and software architects, designers, and other stakeholders.…”
Section: Using the Framework To Evaluate Two Commercial Uml Modeling mentioning
confidence: 99%