Forcing behavioral subtyping through specification inheritance
Proceedings of the 18th international conference on Software engineering
ACM Computing Surveys (CSUR) - Special issue: position statements on strategic directions in computing research
Behavioral Specifications of Businesses and Systems
Behavioral Specifications of Businesses and Systems
Specifying and implementing the operational use of constraints in object-oriented applications
CRPIT '02 Proceedings of the Fortieth International Conference on Tools Pacific: Objects for internet, mobile and embedded applications
An integrity constraint management framework in engineering design
Computers in Industry - Special issue: CSCW in design
Computer
Integrity Maintenance in Object-Oriented Databases
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
iContract - The Java(tm) Design by Contract(tm) Tool
TOOLS '98 Proceedings of the Technology of Object-Oriented Languages and Systems
Adding Contracts to Java with Handshake
Adding Contracts to Java with Handshake
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Interceptor Based Constraint Violation Detection
ECBS '05 Proceedings of the 12th IEEE International Conference and Workshops on Engineering of Computer-Based Systems
Trading Integrity for Availability by Means of Explicit Runtime Constraints
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
Validating UML models and OCL constraints
UML'00 Proceedings of the 3rd international conference on The unified modeling language: advancing the standard
Middleware/application interactions to support adaptive dependability
MAI '07 Proceedings of the 1st workshop on Middleware-application interaction: in conjunction with Euro-Sys 2007
Middleware support for adaptive dependability
Proceedings of the ACM/IFIP/USENIX 2007 International Conference on Middleware
Middleware support for adaptive dependability
MIDDLEWARE2007 Proceedings of the 8th ACM/IFIP/USENIX international conference on Middleware
OCL-based runtime monitoring of applications with protocol state machines
ECMFA'12 Proceedings of the 8th European conference on Modelling Foundations and Applications
Towards supporting multiple execution environments for UML/OCL models at runtime
Proceedings of the 7th Workshop on Models@run.time
Hi-index | 0.00 |
Integrity is a dependability attribute partially ensured through runtime validation of integrity constraints. A wide range of different constraint validation approaches exists--ranging from simple if conditions over explicit constraint validation methods and contract specifications to constraints as first class runtime entities of an application. However, increased support for explicitness and flexibility often comes at the price of increased performance costs. To address this issue, we contribute with an overview and evaluation of different constraint validation approaches for the Java programming language with respect to implementation, maintainability and performance. Our results show that the benefits of some of the more advanced approaches are certainly worth their costs by introducing a runtime overhead of only two to ten times the runtime of the fastest approach while other approaches introduce runtime overheads of more than 100, which might be simply too slow in certain applications.