Title
Architecture compliance checking at run-time
Abstract
In this paper, we report on our experiences with architecture compliance checking - the process of checking whether the planned or specified software architecture is obeyed by the running system - of an OSGi-based, dynamically evolving application in the office domain. To that end, we first show how to dynamically instrument a running system in the context of OSGi in order to collect run-time traces. Second, we explain how to bridge the abstraction gap between run-time traces and software architectures, through the construction of hierarchical Colored Petri nets (CP-nets). In addition, we demonstrate how to design reusable hierarchical CP-nets. In an industry example, we were able to extract views that helped us to identify a number of architecturally relevant issues (e.g., architectural style violations, behavior violations) that would not have been detected otherwise, and could have caused serious problems like system malfunctioning or unauthorized access to sensitive data. Finally, we package valuable experiences and lessons learned from this endeavor.
Year
DOI
Venue
2009
10.1016/j.infsof.2009.06.007
Information & Software Technology
Keywords
Field
DocType
behavior violation,reusable hierarchical cp-nets,run-time trace,architecture compliance checking,hierarchical colored petri net,specified software architecture,abstraction gap,architectural style violation,hierarchical colored petri nets,system malfunction,run-time monitoring,software architecture
Architecture,Abstraction,Programming language,Software engineering,Computer science,Colored petri,Process architecture,Software,Software architecture,Architectural style
Journal
Volume
Issue
ISSN
51
11
Information and Software Technology
Citations 
PageRank 
References 
10
0.82
19
Authors
3
Name
Order
Citations
PageRank
Dharmalingam Ganesan116413.87
Thorsten Keuler2315.97
Yutaro Nishimura3111.19