Requirements-driven runtime reconfiguration for security

2Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The boundary between development time and run time of eternal software intensive applications is fading. In particular, these systems are characterized by the necessity to evolve requirements continuously, even after the deployment. In this paper we focus on the evolution of security requirements and introduce an integrated process to drive runtime reconfiguration from requirements changes. This process relies on two key proposals: systematic strategies to evolve architecture models according to security requirements evolution and the combination of reflective middleware and models@runtime for runtime reconfiguration. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Yskout, K., Ben David, O. N., Scandariato, R., & Baudry, B. (2012). Requirements-driven runtime reconfiguration for security. In Communications in Computer and Information Science (Vol. 255 CCIS, pp. 25–33). https://doi.org/10.1007/978-3-642-28033-7_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free