Filters








5,247 Hits in 4.0 sec

Formally analyzing software architectural specifications using SAM

Xudong He, Huiqun Yu, Tianjun Shi, Junhua Ding, Yi Deng
2004 Journal of Systems and Software  
In this paper, we show how to formally analyze SAM software architecture specifications using two well-known techniques--symbolic model checking with tool Symbolic Model Verifier, and theorem proving with  ...  In this paper, we present a graphical formal software architecture description model called software architecture model (SAM).  ...  The focus of this paper is on how to formally analyze SAM architecture specifications. Interested readers can find how to develop SAM architecture specifications in (He and Deng, 2002) .  ... 
doi:10.1016/s0164-1212(02)00087-0 fatcat:6sn7vpfh7bc23nrabgw3wv2krq

Introducing software architecture specification and analysis in SAM through an example

J Wang, X He, Y Deng
1999 Information and Software Technology  
In this article, we present a formal systematic software architecture specification and analysis methodology called SAM and show how to apply SAM to specify a command control (C2) system and to analyze  ...  Although there have been many published results on specification and analysis method of software architectures, information on sound systematic methodology for modeling and analyzing software architectures  ...  . / Information and Software Technology 41 (1999) [451][452][453][454][455][456][457][458][459][460][461][462][463][464][465][466][467]  ... 
doi:10.1016/s0950-5849(99)00009-9 fatcat:rlscesdei5bupaukbboks4ittq

Modeling and Analyzing the Software Architecture of a Communication Protocol Using SAM [chapter]

Tianjun Shi, Xudong He
2002 IFIP Advances in Information and Communication Technology  
of a software architecture using SAM, (2) it shows a technique to analyze a first order temporal logic specification under a PrT model using symbolic model checking.  ...  AN OVERVIEW OF SAM SAM is a general formal framework for specifying and analyzing software architectures [WHD99] , and has been developed in the past five years at the Florida International University  ... 
doi:10.1007/978-0-387-35607-5_4 fatcat:twfw6rp7lvhnjp3ip2xyhu567q

A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems

Lirong Dai, Kendra M. L. Cooper
2007 International Journal of Network Security  
At this point, a survey for researchers involved in the problem of systematically modelling and analyzing software architecture design that have security properties would be of value to the community.  ...  of security properties, the specific security property modelled (e.g., authentication, role-based access control, etc.), and the kind of example system that has been used to illustrate the approach (information  ...  Software Architecture Model Software Architecture Model (SAM) [17] In [31] , SAM is applied to support the formal design of software architecture for secure distributed systems.  ... 
dblp:journals/ijnsec/DaiC07 fatcat:z2r4mxjoxfharbna3ctqccm2se

Formalizing and validating UML architecture description of web systems

Yujian Fu, Zhijiang Dong, Xudong He
2006 Workshop proceedings of the sixth international conference on Web engineering - ICWE '06  
In this paper, we proposed an approach to solving this issue by translating the UML web service architecture description into a formal modeling language -SO-SAM, and verify the correctness of the web system  ...  Unified Modeling Language (UML), a widely accepted object-oriented system modeling and design language, and adapted for software architecture descriptions for several years, has been used for the web system  ...  Finally, the software developers are required to learn and use specific ADL to model software architecture and use the specific extension of UML, which is exactly the major cause of preventing the wide  ... 
doi:10.1145/1149993.1150002 dblp:conf/icwe/FuDH06a fatcat:35ugy3e5ljcspoe52pz7he5ply

The Software Architecture Mapping Framework for Managing Architectural Knowledge

Sebastien Adam, Alain Abran
2016 Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering  
software architecture mapping (SAM), software structures map (SSM) I.  ...  This paper introduces the Software Architecture Mapping (SAM) framework to manage AK and associated issues by using finer-grained SDAs and networks of weighted arguments.  ...  OVERVIEW OF THE PROPOSED SOFTWARE ARCHITECTURE MAPPING (SAM) FRAMEWORK The SAM framework [11, 12] has been proposed to support software architecture design (SAD) and architecture knowledge management  ... 
doi:10.18293/seke2016-183 dblp:conf/seke/AdamA16 fatcat:sbawgkmq75eljixaxzsw5l42qy

Secure software architectures design by aspect orientation

Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Gao
2005 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05)  
The underlying formalism is the Software Architecture Model (SAM) that combines Petri nets and temporal logic.  ...  An integrated architecture is obtained by weaving aspect models with the base architecture model. Mechanisms in SAM are amenable to analyzing correctness of the architecture design.  ...  SAM is used as the underlying formalism. The AOD method has several benefits.  ... 
doi:10.1109/iceccs.2005.75 dblp:conf/iceccs/YuLHG05 fatcat:7kb4dwfi3rcwpjgbruwv5p23iq

Formalizing and Validating UML Architecture Description of Service-Oriented Applications [chapter]

Zhijiang Dong, Yujian Fu, Xudong He, Yue Fu
2008 Petri Net, Theory and Applications  
Figure 1 shows a graphical view of a simple SAM architecture model. The formal analysis and design strategy of the SAM model on the software architecture is given in work [27] . SAM  ...  Preliminaries Overview of SO-SAM is an extended version of SAM [44] with the web service oriented features. is a general formal framework for specifying and analyzing service-oriented architecture with  ...  Moreover, this approach is used to formally analyze the integration of web services.  ... 
doi:10.5772/5331 fatcat:vem5h7sf4nfe5prmb2uqnzogwq

A comparison framework for runtime monitoring approaches (journal-first abstract)

Rick Rabiser, Sam Guinea, Michael Vierhauser, Luciano Baresi, Paul Grunbacher
2018 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)  
The desired runtime behavior is often formally expressed using temporal logic or through the use of domain-specific (constraint) languages.  ...  architecture or software product lines [7], [8].  ...  The desired runtime behavior is often formally expressed using temporal logic or through the use of domain-specific (constraint) languages.  ... 
doi:10.1109/saner.2018.8330238 dblp:conf/wcre/RabiserGVBG18 fatcat:av63t3m3prcy7mdz4j4x3w3lu4

An approach for classifying design artifacts

Sebastien Adam, Ghizlane El Boussaidi, Alain Abran
2015 Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering  
Keywords-software knowledge management, software artifacts, multi-dimension analysis, decision support systems I.  ...  proposes a technique that systematizes the classification of SDAs, and a classification scheme (CS) which organizes the SDAs into a matrix, in a manner derived from the Zachman Framework for enterprise architecture  ...  The SAM (Software Architecture Mapping) framework [9] was proposed to manage the accumulated knowledge related to software design in an integrated and systematic manner.  ... 
doi:10.18293/seke2015-226 dblp:conf/seke/AdamEA15 fatcat:u64spvzlwfb7dh4ki5k5mw6aiy

An approach for modeling and analysis of security system architectures

Yi Deng, Jiacun Wang, J.J.P. Tsai, K. Beznosov
2003 IEEE Transactions on Knowledge and Data Engineering  
We introduce the concept of security constraint patterns, which formally specify the generic form of security policies that all implementations of the system architecture must enforce.  ...  We demonstrate the methodology through a case study in which we model and analyze the architecture of the Resource Access Decision (RAD) Facility, an OMG standard for application-level authorization service  ...  ACKNOWLEDGMENTS This work was supported in part by the US National Science Foundation under grant No. CCR-0098120 and by the US Army Research Office under grant No. DAAG55-98-1-0428.  ... 
doi:10.1109/tkde.2003.1232267 fatcat:odpsugeiznhohbmcuifhpovtwq

Model-Driven Development Meets Security: An Evaluation of Current Approaches

K Kasal, J Heurix, T Neubauer
2011 2011 44th Hawaii International Conference on System Sciences  
Deficiencies in software design are the main reasons for security incidents, resulting in severe economic consequences for (i) the organizations using the software and (ii) the development companies.  ...  Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues during software design  ...  [20] apply software architecture models (SAM) to define the system's software architecture and the required security aspects.  ... 
doi:10.1109/hicss.2011.310 dblp:conf/hicss/KasalHN11 fatcat:eujsqve6ovgpbagm6nmftoi7li

Revisiting a Formal Framework for Modeling Aspects in the Design Phase

Virginia de Paula, Thais Batista
2007 Early Aspects at ICSE: Workshops in Aspect-Oriented Requirements Engineering and Architecture Design (EARLYASPECTS'07)  
Software architecture description languages (ADLs) and formal methods have been successfully used together during the design phase allowing the semantic validation of systems early in the development process  ...  Recently, a lot of Aspect-Oriented ADLs (AO ADLs) have been proposed however, most of them, neglects the modeling of aspect-oriented (AO) concepts using formal specification.  ...  The work presented in [11] extends SAM, a general formal framework, for specifying and analyzing software architectures.  ... 
doi:10.1109/earlyaspects.2007.9 fatcat:wyjon6t5vvdlhery7yr7ttbexy

ICSE 2003 workshop on software architectures for dependable systems

Rogério de Lemos, Cristina Gacek, Alexander Romanovsky
2003 Software engineering notes  
This workshop summary gives a brief overview of a one-day Workshop on "Software Architectures for Dependable Systems" held in conjunction with ICSE 2003.  ...  He) Software Architecture Model (SAM) is a formal framework for specifying and analysing software architectures and has been used to verify a variety of functional properties.  ...  Dependability Analysis Using SAM (T. Shi, X.  ... 
doi:10.1145/966221.966230 fatcat:l3simkekavc5faaqhrovjym3a4

Data Distribution and Exploitation in a Global Microservice Artefact Observatory

Panagiotis Gkikopoulos
2019 2019 IEEE World Congress on Services (SERVICES)  
Cloud computing and specifically the microservice architecture pattern is becoming an increasingly prominent paradigm in computer science.  ...  Many modern cloud applications are composed of a variety of different microservices, each potentially built in different languages, using different technologies and a different software artefact structure  ...  These services are loosely connected and typically interact with each other within their specific architecture using Representational State Transfer (REST) Application Programming Interfaces (APIs) [2  ... 
doi:10.1109/services.2019.00089 dblp:conf/services/Gkikopoulos19 fatcat:p452wfqc6vapdev4wdxtiz2yjm
« Previous Showing results 1 — 15 out of 5,247 results