Understanding Z: a specification language and its formal semantics
Understanding Z: a specification language and its formal semantics
Use Case Maps as Architectural Entities for Complex Systems
IEEE Transactions on Software Engineering
A framework for building non-functional software architectures
Proceedings of the 2001 ACM symposium on Applied computing
Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering
A fault detection service for wide area distributed computations
Cluster Computing
Incorporating Non-functional Requirements into Software Architectures
IPDPS '00 Proceedings of the 15 IPDPS 2000 Workshops on Parallel and Distributed Processing
Software Architecture in Practice
Software Architecture in Practice
Putting non-functional requirements into software architecture
IWSSD '98 Proceedings of the 9th international workshop on Software specification and design
Designing Security Architecture Solutions
Designing Security Architecture Solutions
A formal approach to software architecture
A formal approach to software architecture
The Impact of Maintainability on Component-based Software Systems
EUROMICRO '03 Proceedings of the 29th Conference on EUROMICRO
A Role-Based Metamodeling Approach to Specifying Design Patterns
COMPSAC '03 Proceedings of the 27th Annual International Conference on Computer Software and Applications
A UML-Based Pattern Specification Technique
IEEE Transactions on Software Engineering
Nonfunctional Requirements: From Elicitation to Conceptual Models
IEEE Transactions on Software Engineering
Generating UML Models from Domain Patterns
SERA '05 Proceedings of the Third ACIS Int'l Conference on Software Engineering Research, Management and Applications
High Availability and Disaster Recovery: Concepts, Design, Implementation
High Availability and Disaster Recovery: Concepts, Design, Implementation
Network Security Bible
Automated classification of non-functional requirements
Requirements Engineering
Describing access control models as design patterns using roles
Proceedings of the 2006 conference on Pattern languages of programs
Using rationale to support pattern-based architectural design
Proceedings of the 2010 ICSE Workshop on Sharing and Reusing Architectural Knowledge
Tool support for quality-driven development of software architectures
Proceedings of the IEEE/ACM international conference on Automated software engineering
Facilitating the selection of architectural patterns by means of a marked requirements model
ECSA'10 Proceedings of the 4th European conference on Software architecture
A feature-based approach for modeling role-based access control systems
Journal of Systems and Software
Supervising the evolution of web service orchestrations using quality requirements
ECSA'11 Proceedings of the 5th European conference on Software architecture
Beyond ATAM: Early architecture evaluation method for large-scale distributed systems
Journal of Systems and Software
HIS'13 Proceedings of the second international conference on Health Information Science
Adaptation space exploration for service-oriented applications
Science of Computer Programming
Hi-index | 0.00 |
This paper presents a quality-driven approach to embodying non-functional requirements (NFRs) into software architecture using architectural tactics. Architectural tactics are reusable architectural building blocks, providing general architectural solutions for common issues pertaining to quality attributes. In this approach, architectural tactics are represented as feature models, and their semantics is defined using the Role-Based Metamodeling Language (RBML) which is a UML-based pattern specification notation. Given a set of NFRs, architectural tactics are selected and composed, and the composed tactic is used to instantiate an initial architecture for the application. The proposed approach addresses both the structural and behavioral aspects of architecture. We describe the approach using tactics for performance, availability and security to develop an architecture for a stock trading system. We demonstrate tool support for instantiating a composed tactic to generate an initial architecture of the stock trading system.