Maintaining Security in Software Evolution

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandBeitrag in Buch/SammelwerkForschungPeer-Review

Autoren

  • Jan Jürjens
  • Kurt Schneider
  • Jens Bürger
  • Fabien Patrick Viertel
  • Daniel Strüber
  • Michael Goedicke
  • Ralf Reußner
  • Robert Heinrich
  • Emre Taspolatoglu
  • Konersmann Marco
  • Alexander Fay
  • Winfried Lamersdorf
  • Jan Ladiges
  • Christopher Haubeck

Organisationseinheiten

Externe Organisationen

  • Karlsruher Institut für Technologie (KIT)
  • Universität Koblenz-Landau
  • Universität Duisburg-Essen
  • FZI Research Center for Information Technology
  • Helmut-Schmidt-Universität/Universität der Bundeswehr Hamburg
  • Universität Hamburg
Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
Titel des SammelwerksManaged Software Evolution
Herausgeber/-innenRalf Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, Lukas Märtin
Herausgeber (Verlag)Springer Open
Seiten207-253
Auflage1.
ISBN (elektronisch)978-3-030-13499-0
ISBN (Print)978-3-030-13498-3, 978-3-030-13501-0
PublikationsstatusVeröffentlicht - 27 Juni 2019

Abstract

In this chapter, we introduce a three-layered framework for maintaining security in software evolution at design time and run time. Additionally, we present a suite of five approaches that employ the framework. Two approaches focus on design-time use of knowledge extracted from natural-language documents to identify potential steps for co-evolving the system’s design and on integrating architecture model information with program code. A third approach bridges design time and run time to support architects as the software evolves. The two remaining approaches focus on run-time security maintenance. The fourth approach monitors run-time information in order to detect suspicious behaviour, which is reacted to automatically by adapting the system with mitigation, while the fifth approach focuses on interdisciplinary changes in automation software. In combination, the approaches address current challenges for security maintenance at design time and run time.

Zitieren

Maintaining Security in Software Evolution. / Jürjens, Jan; Schneider, Kurt; Bürger, Jens et al.
Managed Software Evolution. Hrsg. / Ralf Reussner; Michael Goedicke; Wilhelm Hasselbring; Birgit Vogel-Heuser; Jan Keim; Lukas Märtin. 1. Aufl. Springer Open, 2019. S. 207-253.

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandBeitrag in Buch/SammelwerkForschungPeer-Review

Jürjens, J, Schneider, K, Bürger, J, Viertel, FP, Strüber, D, Goedicke, M, Reußner, R, Heinrich, R, Taspolatoglu, E, Marco, K, Fay, A, Lamersdorf, W, Ladiges, J & Haubeck, C 2019, Maintaining Security in Software Evolution. in R Reussner, M Goedicke, W Hasselbring, B Vogel-Heuser, J Keim & L Märtin (Hrsg.), Managed Software Evolution. 1. Aufl., Springer Open, S. 207-253. https://doi.org/10.1007/978-3-030-13499-0_9
Jürjens, J., Schneider, K., Bürger, J., Viertel, F. P., Strüber, D., Goedicke, M., Reußner, R., Heinrich, R., Taspolatoglu, E., Marco, K., Fay, A., Lamersdorf, W., Ladiges, J., & Haubeck, C. (2019). Maintaining Security in Software Evolution. In R. Reussner, M. Goedicke, W. Hasselbring, B. Vogel-Heuser, J. Keim, & L. Märtin (Hrsg.), Managed Software Evolution (1. Aufl., S. 207-253). Springer Open. https://doi.org/10.1007/978-3-030-13499-0_9
Jürjens J, Schneider K, Bürger J, Viertel FP, Strüber D, Goedicke M et al. Maintaining Security in Software Evolution. in Reussner R, Goedicke M, Hasselbring W, Vogel-Heuser B, Keim J, Märtin L, Hrsg., Managed Software Evolution. 1. Aufl. Springer Open. 2019. S. 207-253 doi: 10.1007/978-3-030-13499-0_9
Jürjens, Jan ; Schneider, Kurt ; Bürger, Jens et al. / Maintaining Security in Software Evolution. Managed Software Evolution. Hrsg. / Ralf Reussner ; Michael Goedicke ; Wilhelm Hasselbring ; Birgit Vogel-Heuser ; Jan Keim ; Lukas Märtin. 1. Aufl. Springer Open, 2019. S. 207-253
Download
@inbook{9fcbe1337e154944aab545b8debdba65,
title = "Maintaining Security in Software Evolution",
abstract = "In this chapter, we introduce a three-layered framework for maintaining security in software evolution at design time and run time. Additionally, we present a suite of five approaches that employ the framework. Two approaches focus on design-time use of knowledge extracted from natural-language documents to identify potential steps for co-evolving the system{\textquoteright}s design and on integrating architecture model information with program code. A third approach bridges design time and run time to support architects as the software evolves. The two remaining approaches focus on run-time security maintenance. The fourth approach monitors run-time information in order to detect suspicious behaviour, which is reacted to automatically by adapting the system with mitigation, while the fifth approach focuses on interdisciplinary changes in automation software. In combination, the approaches address current challenges for security maintenance at design time and run time.",
author = "Jan J{\"u}rjens and Kurt Schneider and Jens B{\"u}rger and Viertel, {Fabien Patrick} and Daniel Str{\"u}ber and Michael Goedicke and Ralf Reu{\ss}ner and Robert Heinrich and Emre Taspolatoglu and Konersmann Marco and Alexander Fay and Winfried Lamersdorf and Jan Ladiges and Christopher Haubeck",
year = "2019",
month = jun,
day = "27",
doi = "10.1007/978-3-030-13499-0_9",
language = "English",
isbn = "978-3-030-13498-3",
pages = "207--253",
editor = "Ralf Reussner and Michael Goedicke and Wilhelm Hasselbring and Birgit Vogel-Heuser and Jan Keim and Lukas M{\"a}rtin",
booktitle = "Managed Software Evolution",
publisher = "Springer Open",
address = "United Kingdom (UK)",
edition = "1.",

}

Download

TY - CHAP

T1 - Maintaining Security in Software Evolution

AU - Jürjens, Jan

AU - Schneider, Kurt

AU - Bürger, Jens

AU - Viertel, Fabien Patrick

AU - Strüber, Daniel

AU - Goedicke, Michael

AU - Reußner, Ralf

AU - Heinrich, Robert

AU - Taspolatoglu, Emre

AU - Marco, Konersmann

AU - Fay, Alexander

AU - Lamersdorf, Winfried

AU - Ladiges, Jan

AU - Haubeck, Christopher

PY - 2019/6/27

Y1 - 2019/6/27

N2 - In this chapter, we introduce a three-layered framework for maintaining security in software evolution at design time and run time. Additionally, we present a suite of five approaches that employ the framework. Two approaches focus on design-time use of knowledge extracted from natural-language documents to identify potential steps for co-evolving the system’s design and on integrating architecture model information with program code. A third approach bridges design time and run time to support architects as the software evolves. The two remaining approaches focus on run-time security maintenance. The fourth approach monitors run-time information in order to detect suspicious behaviour, which is reacted to automatically by adapting the system with mitigation, while the fifth approach focuses on interdisciplinary changes in automation software. In combination, the approaches address current challenges for security maintenance at design time and run time.

AB - In this chapter, we introduce a three-layered framework for maintaining security in software evolution at design time and run time. Additionally, we present a suite of five approaches that employ the framework. Two approaches focus on design-time use of knowledge extracted from natural-language documents to identify potential steps for co-evolving the system’s design and on integrating architecture model information with program code. A third approach bridges design time and run time to support architects as the software evolves. The two remaining approaches focus on run-time security maintenance. The fourth approach monitors run-time information in order to detect suspicious behaviour, which is reacted to automatically by adapting the system with mitigation, while the fifth approach focuses on interdisciplinary changes in automation software. In combination, the approaches address current challenges for security maintenance at design time and run time.

U2 - 10.1007/978-3-030-13499-0_9

DO - 10.1007/978-3-030-13499-0_9

M3 - Contribution to book/anthology

SN - 978-3-030-13498-3

SN - 978-3-030-13501-0

SP - 207

EP - 253

BT - Managed Software Evolution

A2 - Reussner, Ralf

A2 - Goedicke, Michael

A2 - Hasselbring, Wilhelm

A2 - Vogel-Heuser, Birgit

A2 - Keim, Jan

A2 - Märtin, Lukas

PB - Springer Open

ER -

Von denselben Autoren