Details
Original language | English |
---|---|
Title of host publication | Managed Software Evolution |
Editors | Ralf Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, Lukas Märtin |
Publisher | Springer Open |
Pages | 207-253 |
Edition | 1. |
ISBN (electronic) | 978-3-030-13499-0 |
ISBN (print) | 978-3-030-13498-3, 978-3-030-13501-0 |
Publication status | Published - 27 Jun 2019 |
Abstract
Cite this
- Standard
- Harvard
- Apa
- Vancouver
- BibTeX
- RIS
Managed Software Evolution. ed. / Ralf Reussner; Michael Goedicke; Wilhelm Hasselbring; Birgit Vogel-Heuser; Jan Keim; Lukas Märtin. 1. ed. Springer Open, 2019. p. 207-253.
Research output: Chapter in book/report/conference proceeding › Contribution to book/anthology › Research › peer review
}
TY - CHAP
T1 - Maintaining Security in Software Evolution
AU - Jürjens, Jan
AU - Schneider, Kurt
AU - Bürger, Jens
AU - Viertel, Fabien Patrick
AU - Strüber, Daniel
AU - Goedicke, Michael
AU - Reußner, Ralf
AU - Heinrich, Robert
AU - Taspolatoglu, Emre
AU - Marco, Konersmann
AU - Fay, Alexander
AU - Lamersdorf, Winfried
AU - Ladiges, Jan
AU - Haubeck, Christopher
PY - 2019/6/27
Y1 - 2019/6/27
N2 - In this chapter, we introduce a three-layered framework for maintaining security in software evolution at design time and run time. Additionally, we present a suite of five approaches that employ the framework. Two approaches focus on design-time use of knowledge extracted from natural-language documents to identify potential steps for co-evolving the system’s design and on integrating architecture model information with program code. A third approach bridges design time and run time to support architects as the software evolves. The two remaining approaches focus on run-time security maintenance. The fourth approach monitors run-time information in order to detect suspicious behaviour, which is reacted to automatically by adapting the system with mitigation, while the fifth approach focuses on interdisciplinary changes in automation software. In combination, the approaches address current challenges for security maintenance at design time and run time.
AB - In this chapter, we introduce a three-layered framework for maintaining security in software evolution at design time and run time. Additionally, we present a suite of five approaches that employ the framework. Two approaches focus on design-time use of knowledge extracted from natural-language documents to identify potential steps for co-evolving the system’s design and on integrating architecture model information with program code. A third approach bridges design time and run time to support architects as the software evolves. The two remaining approaches focus on run-time security maintenance. The fourth approach monitors run-time information in order to detect suspicious behaviour, which is reacted to automatically by adapting the system with mitigation, while the fifth approach focuses on interdisciplinary changes in automation software. In combination, the approaches address current challenges for security maintenance at design time and run time.
U2 - 10.1007/978-3-030-13499-0_9
DO - 10.1007/978-3-030-13499-0_9
M3 - Contribution to book/anthology
SN - 978-3-030-13498-3
SN - 978-3-030-13501-0
SP - 207
EP - 253
BT - Managed Software Evolution
A2 - Reussner, Ralf
A2 - Goedicke, Michael
A2 - Hasselbring, Wilhelm
A2 - Vogel-Heuser, Birgit
A2 - Keim, Jan
A2 - Märtin, Lukas
PB - Springer Open
ER -