ABSTRACT
The software architecture of a system-to-be affects the fulfillment of the desired quality requirements for this system. For building upon common knowledge and best practices, the use of architectural patterns in the software architecture has shown to be valuable. Besides their functional properties, each architectural pattern has benefits and liabilities regarding the fulfillment of quality requirements. Whereas architectural patterns contribute to the fulfillment of several quality requirements positively or negatively in a larger scale, tactics aim at improving one specific quality requirement in a more local manner. In order to tailor a software architecture for satisfying one or more specific quality requirements, tactics have to be integrated into the structure of the architectural patterns. In this paper, we investigate the relationship between several architectural patterns and performance as well as security tactics. We study how easily one tactic can be implemented in an architectural pattern. Based on our investigation, we provide mappings between the architectural patterns and tactics. Additionally, we provide a reasoning for the relations we found. To discover the relevant factors for creating reliable relations, we conduct an experiment at the EuroPLoP 2015 as a Focus Group. We describe the definition and planning of this experiment. The results will be used to define a method for creating a reliable mapping between tactics and architectural patterns. The expected target audience for our paper is software architects as well as researchers with an interest in software architectures and controlled experiments.
- Aaker, D. A. and Bagozzi, R. P. 1979. Structural equation modeling. foundations and extensions. Journal of Marketing Research 16.Google Scholar
- Avgeriou, P. and Zdun, U. 2005. Architectural patterns revisited: a pattern language. In In 10th European Conference on Pattern Languages of Programs (EuroPlop 2005), Irsee. 1--39.Google Scholar
- Bachmann, F., Bass, L., and Nord, R. 2007. Modifiability tactics. Tech. rep., Software Engineering Institute. September.Google Scholar
- Bass, L., Clemens, P., and Kazman, R. 2012. Software Architecture in Practice Third Ed. Addison-Wesley. Google ScholarDigital Library
- Bollen, K. A. and Long, J. S. 1993. Testing Structural Equation Models. SAGE Focus Editions. SAGE Publications.Google Scholar
- Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., and Stal, M. 1996. Pattern-Oriented Software Architecture: A System of Patterns. Vol. 1. John Wiley & Sons. Google ScholarDigital Library
- Chin, W. W. 1998. The partial least squares approach to structural equation modeling. In Modern Methods for Business Research, G. A. Marcoulides, Ed. Lawrence Erlbaum Associates, Hillsdale, NJ, 294--336.Google Scholar
- Cohen, J. 1960. A Coefficient of Agreement for Nominal Scales. Educational and Psychological Measurement 20, 1, 37.Google ScholarCross Ref
- Fornell, C. and Bookstein, F. L. 1982. Structural equation models: Lisrel and pls applied to consumer exit-voice theory. Journal of Marketing Research 19.Google ScholarCross Ref
- Fuchs, A. 2011. Methodische aspekte linearer strukturgleichungsmodelle. ein vergleich von kovarianz- und varianzbasierten kausalanalyseverfahren. Tech. Rep. 2/2011, Julius-Maximilians-UniversitÃd't WÃijrzburg, Lehrstuhl fÃijr BWL und Marketing.Google Scholar
- Gamma, E., Helm, R., Johnson, R., and Vlissides, J. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley. Google ScholarDigital Library
- Harrison, N. B. and Avgeriou, P. 2008. Incorporating fault tolerance tactics in software architecture patterns. In Proceedings of the RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems. SERENE '08. ACM, New York, NY, USA, 9--18. Google ScholarDigital Library
- Harrison, N. B. and Avgeriou, P. 2010. How do architecture patterns and tactics interact? a model and annotation. J. Syst. Softw. 83, 10, 1735--1758. Google ScholarDigital Library
- Harrison, N. B., Avgeriou, P., and Zdun, U. 2010. On the impact of fault tolerance tactics on architecture patterns. In Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems. SERENE '10. ACM, New York, NY, USA, 12--21. Google ScholarDigital Library
- Kaplan, D. 2009. Structural equation modeling. Foundations and extensions 2. Ed. Advanced quantitative techniques in the social sciences Series, vol. 10. SAGE, Thousand Oaks u. a.Google Scholar
- Mirakhorli, M., Mäder, P., and Cleland-Huang, J. 2012. Variability points and design pattern usage in architectural tactics. In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. FSE '12. ACM, New York, NY, USA, 52:1--52:11. Google ScholarDigital Library
- Nitzl, C. 2010. Eine anwenderorientierte einführung in die partial least square (PLS)-methode. Tech. rep., Industrielles Management, Universität Hamburg. June.Google Scholar
- Ozkaya, I., Bass, L., Sangwan, R. S., and Nord, R. L. 2008. Making practical use of quality attribute information. IEEE Softw. 25, 2, 25--33. Google ScholarDigital Library
- Ryoo, J., Laplante, P., and Kazman, R. 2012. Revising a security tactics hierarchy through decomposition, reclassification, and derivation. In Software Security and Reliability Companion (SERE-C), 2012 IEEE Sixth International Conference on. 85--91. Google ScholarDigital Library
- Sanchez, A., Aguiar, A., Barbosa, L. S., and Riesco, D. 2012. Analysing tactics in architectural patterns. In Software Engineering Workshop (SEW), 2012 35th Annual IEEE. 32--41. Google ScholarDigital Library
- Shaw, M. and Garlan, G. 1996. Software Architecture: Perspectives on an emerging discipline. Prentice Hall. Google ScholarDigital Library
- Taylor, R. N., Medvidovic, N., and Dashofy, E. M. 2009. Software Architecture: Foundations, Theory, and Practice. Wiley Publishing. Google ScholarDigital Library
- Weiber, R. and Mühlhaus, D. 2009. Strukturgleichungsmodellierung: Eine anwendungsorientierte Einführung in die Kausalanalyse mit Hilfe von AMOS, SmartPLS und SPSS. Springer-Lehrbuch. Springer.Google ScholarCross Ref
- Wohlin, C., Runeson, P., Höst, M., Ohlsson, M. C., Regnell, B., and Wesslén, A. 2000. Experimentation in Software Engineering: An Introduction. Kluwer Academic Publishers, Norwell, MA, USA. Google ScholarDigital Library
- Zheng, J. and Harper, K. E. 2010. Concurrency design patterns, software quality attributes and their tactics. In Proceedings of the 3rd International Workshop on Multicore Software Engineering. IWMSE '10. ACM, New York, NY, USA, 40--47. Google ScholarDigital Library
- Zhu, L., Babar, M., and Jeffery, R. 2004. Mining patterns to support software architecture evaluation. In Proceedings of the Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA). 25--34. Google ScholarDigital Library
Index Terms
- Towards a reliable mapping between performance and security tactics, and architectural patterns
Recommendations
Towards systematic selection of architectural patterns with respect to quality requirements
EuroPLoP '15: Proceedings of the 20th European Conference on Pattern Languages of ProgramsThe design of software architecture for a system-to-be is a challenge, since required functionality as well as the desired quality requirements have to be considered. Building upon common knowledge and best practices captured in architectural patterns ...
How do architecture patterns and tactics interact? A model and annotation
Software architecture designers inevitably work with both architecture patterns and tactics. Architecture patterns describe the high-level structure and behavior of software systems as the solution to multiple system requirements, whereas tactics are ...
Towards Automation of Performance Architectural Tactics Application
WICSA '11: Proceedings of the 2011 Ninth Working IEEE/IFIP Conference on Software ArchitectureThis paper describes the implementation of performance architectural tactics in ArchE, an expert system designed to help architects elaborate software architectures by automating certain tasks. Our goal was to explore what is involved in converting ...
Comments