Building sustainable software by preemptive architectural design using tactic-equipped patterns

Dae Kyoo Kim, Jungwoo Ryoo, Suntae Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Sustainability of software architectures has gained increasing attention to cope with factors causing architectural changes such as requirements changes, technological changes, and changes in business strategies and goals. However, there has not been much work on architectural sustainability. In this paper, we present a novel approach for addressing architectural sustainability with respect to non-functional requirements changes through preemptive architectural designs built upon the combined use of architectural patterns and architectural tactics. The approach presented in this paper provides a strategic solution for practitioners to building a quality attribute into a chosen architectural pattern to proactively deal with the requirements changes of quality attribute, which may arise after the construction phase.

Original languageEnglish (US)
Title of host publicationProceedings - 9th International Conference on Availability, Reliability and Security, ARES 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages484-489
Number of pages6
ISBN (Electronic)9781479942237
DOIs
StatePublished - Dec 9 2014
Event9th International Conference on Availability, Reliability and Security, ARES 2014 - Fribourg, Switzerland
Duration: Sep 8 2014Sep 12 2014

Publication series

NameProceedings - 9th International Conference on Availability, Reliability and Security, ARES 2014

Other

Other9th International Conference on Availability, Reliability and Security, ARES 2014
Country/TerritorySwitzerland
CityFribourg
Period9/8/149/12/14

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Building sustainable software by preemptive architectural design using tactic-equipped patterns'. Together they form a unique fingerprint.

Cite this