skip to main content
10.1145/2855321.2855361acmotherconferencesArticle/Chapter ViewAbstractPublication PageseuroplopConference Proceedingsconference-collections
research-article

Towards a reliable mapping between performance and security tactics, and architectural patterns

Authors Info & Claims
Published:08 July 2015Publication History

ABSTRACT

The software architecture of a system-to-be affects the fulfillment of the desired quality requirements for this system. For building upon common knowledge and best practices, the use of architectural patterns in the software architecture has shown to be valuable. Besides their functional properties, each architectural pattern has benefits and liabilities regarding the fulfillment of quality requirements. Whereas architectural patterns contribute to the fulfillment of several quality requirements positively or negatively in a larger scale, tactics aim at improving one specific quality requirement in a more local manner. In order to tailor a software architecture for satisfying one or more specific quality requirements, tactics have to be integrated into the structure of the architectural patterns. In this paper, we investigate the relationship between several architectural patterns and performance as well as security tactics. We study how easily one tactic can be implemented in an architectural pattern. Based on our investigation, we provide mappings between the architectural patterns and tactics. Additionally, we provide a reasoning for the relations we found. To discover the relevant factors for creating reliable relations, we conduct an experiment at the EuroPLoP 2015 as a Focus Group. We describe the definition and planning of this experiment. The results will be used to define a method for creating a reliable mapping between tactics and architectural patterns. The expected target audience for our paper is software architects as well as researchers with an interest in software architectures and controlled experiments.

References

  1. Aaker, D. A. and Bagozzi, R. P. 1979. Structural equation modeling. foundations and extensions. Journal of Marketing Research 16.Google ScholarGoogle Scholar
  2. Avgeriou, P. and Zdun, U. 2005. Architectural patterns revisited: a pattern language. In In 10th European Conference on Pattern Languages of Programs (EuroPlop 2005), Irsee. 1--39.Google ScholarGoogle Scholar
  3. Bachmann, F., Bass, L., and Nord, R. 2007. Modifiability tactics. Tech. rep., Software Engineering Institute. September.Google ScholarGoogle Scholar
  4. Bass, L., Clemens, P., and Kazman, R. 2012. Software Architecture in Practice Third Ed. Addison-Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bollen, K. A. and Long, J. S. 1993. Testing Structural Equation Models. SAGE Focus Editions. SAGE Publications.Google ScholarGoogle Scholar
  6. Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., and Stal, M. 1996. Pattern-Oriented Software Architecture: A System of Patterns. Vol. 1. John Wiley & Sons. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Chin, W. W. 1998. The partial least squares approach to structural equation modeling. In Modern Methods for Business Research, G. A. Marcoulides, Ed. Lawrence Erlbaum Associates, Hillsdale, NJ, 294--336.Google ScholarGoogle Scholar
  8. Cohen, J. 1960. A Coefficient of Agreement for Nominal Scales. Educational and Psychological Measurement 20, 1, 37.Google ScholarGoogle ScholarCross RefCross Ref
  9. Fornell, C. and Bookstein, F. L. 1982. Structural equation models: Lisrel and pls applied to consumer exit-voice theory. Journal of Marketing Research 19.Google ScholarGoogle ScholarCross RefCross Ref
  10. Fuchs, A. 2011. Methodische aspekte linearer strukturgleichungsmodelle. ein vergleich von kovarianz- und varianzbasierten kausalanalyseverfahren. Tech. Rep. 2/2011, Julius-Maximilians-UniversitÃd't WÃijrzburg, Lehrstuhl fÃijr BWL und Marketing.Google ScholarGoogle Scholar
  11. Gamma, E., Helm, R., Johnson, R., and Vlissides, J. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Harrison, N. B. and Avgeriou, P. 2008. Incorporating fault tolerance tactics in software architecture patterns. In Proceedings of the RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems. SERENE '08. ACM, New York, NY, USA, 9--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Harrison, N. B. and Avgeriou, P. 2010. How do architecture patterns and tactics interact? a model and annotation. J. Syst. Softw. 83, 10, 1735--1758. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Harrison, N. B., Avgeriou, P., and Zdun, U. 2010. On the impact of fault tolerance tactics on architecture patterns. In Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems. SERENE '10. ACM, New York, NY, USA, 12--21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kaplan, D. 2009. Structural equation modeling. Foundations and extensions 2. Ed. Advanced quantitative techniques in the social sciences Series, vol. 10. SAGE, Thousand Oaks u. a.Google ScholarGoogle Scholar
  16. Mirakhorli, M., Mäder, P., and Cleland-Huang, J. 2012. Variability points and design pattern usage in architectural tactics. In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. FSE '12. ACM, New York, NY, USA, 52:1--52:11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Nitzl, C. 2010. Eine anwenderorientierte einführung in die partial least square (PLS)-methode. Tech. rep., Industrielles Management, Universität Hamburg. June.Google ScholarGoogle Scholar
  18. Ozkaya, I., Bass, L., Sangwan, R. S., and Nord, R. L. 2008. Making practical use of quality attribute information. IEEE Softw. 25, 2, 25--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Ryoo, J., Laplante, P., and Kazman, R. 2012. Revising a security tactics hierarchy through decomposition, reclassification, and derivation. In Software Security and Reliability Companion (SERE-C), 2012 IEEE Sixth International Conference on. 85--91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Sanchez, A., Aguiar, A., Barbosa, L. S., and Riesco, D. 2012. Analysing tactics in architectural patterns. In Software Engineering Workshop (SEW), 2012 35th Annual IEEE. 32--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Shaw, M. and Garlan, G. 1996. Software Architecture: Perspectives on an emerging discipline. Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Taylor, R. N., Medvidovic, N., and Dashofy, E. M. 2009. Software Architecture: Foundations, Theory, and Practice. Wiley Publishing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Weiber, R. and Mühlhaus, D. 2009. Strukturgleichungsmodellierung: Eine anwendungsorientierte Einführung in die Kausalanalyse mit Hilfe von AMOS, SmartPLS und SPSS. Springer-Lehrbuch. Springer.Google ScholarGoogle ScholarCross RefCross Ref
  24. Wohlin, C., Runeson, P., Höst, M., Ohlsson, M. C., Regnell, B., and Wesslén, A. 2000. Experimentation in Software Engineering: An Introduction. Kluwer Academic Publishers, Norwell, MA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Zheng, J. and Harper, K. E. 2010. Concurrency design patterns, software quality attributes and their tactics. In Proceedings of the 3rd International Workshop on Multicore Software Engineering. IWMSE '10. ACM, New York, NY, USA, 40--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Zhu, L., Babar, M., and Jeffery, R. 2004. Mining patterns to support software architecture evaluation. In Proceedings of the Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA). 25--34. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards a reliable mapping between performance and security tactics, and architectural patterns

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Other conferences
                    EuroPLoP '15: Proceedings of the 20th European Conference on Pattern Languages of Programs
                    July 2015
                    714 pages
                    ISBN:9781450338479
                    DOI:10.1145/2855321

                    Copyright © 2015 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 8 July 2015

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • research-article

                    Acceptance Rates

                    Overall Acceptance Rate216of354submissions,61%

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader