The boundary between development time and run time of eternal software intensive applications is fading. In particular, these systems are characterized by the necessity to evolve requirements continuously, even after the deployment. In this paper we focus on the evolution of security requirements and introduce an integrated process to drive runtime reconfiguration from requirements changes. This process relies on two key proposals: systematic strategies to evolve architecture models according to security requirements evolution and the combination of reflective middleware and models@runtime for runtime reconfiguration. © 2012 Springer-Verlag.
CITATION STYLE
Yskout, K., Ben David, O. N., Scandariato, R., & Baudry, B. (2012). Requirements-driven runtime reconfiguration for security. In Communications in Computer and Information Science (Vol. 255 CCIS, pp. 25–33). https://doi.org/10.1007/978-3-642-28033-7_3
Mendeley helps you to discover research relevant for your work.