{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:26:00Z","timestamp":1726043160664},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030299828"},{"type":"electronic","value":"9783030299835"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29983-5_11","type":"book-chapter","created":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T19:02:43Z","timestamp":1567364563000},"page":"161-177","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimising Architectures for Performance, Cost, and Security"],"prefix":"10.1007","author":[{"given":"Rajitha","family":"Yasaweerasinghelage","sequence":"first","affiliation":[]},{"given":"Mark","family":"Staples","sequence":"additional","affiliation":[]},{"given":"Hye-Young","family":"Paik","sequence":"additional","affiliation":[]},{"given":"Ingo","family":"Weber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,2]]},"reference":[{"issue":"5","key":"11_CR1","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TSE.2012.64","volume":"39","author":"A Aleti","year":"2013","unstructured":"Aleti, A., Buhnova, B., Grunske, L., Koziolek, A., Meedeniya, I.: Software architecture optimization methods: a systematic literature review. IEEE Trans. Softw. Eng. 39(5), 658\u2013683 (2013)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/s13174-014-0011-3","volume":"5","author":"D Ardagna","year":"2014","unstructured":"Ardagna, D., Casale, G., Ciavotta, M., P\u00e9rez, J.F., Wang, W.: Quality-of-service in cloud computing: modeling techniques and their applications. J. Internet Serv. Appl. 5, 5\u201311 (2014)","journal-title":"J. Internet Serv. Appl."},{"issue":"5","key":"11_CR3","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1109\/TSE.2004.9","volume":"30","author":"S Balsamo","year":"2004","unstructured":"Balsamo, S., Di Marco, A., Inverardi, P., Simeoni, M.: Model-based performance prediction in software development: a survey. IEEE Trans. Softw. Eng. 30(5), 295\u2013310 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jss.2008.03.066","volume":"82","author":"S Becker","year":"2009","unstructured":"Becker, S., Koziolek, H., Reussner, R.: The Palladio component model for model-driven performance prediction. J. Syst. Softw. 82(1), 3\u201322 (2009)","journal-title":"J. Syst. Softw."},{"key":"11_CR5","unstructured":"Brunnert, A., et al.: Performance-oriented DevOps: a research agenda. arXiv preprint \n                      arXiv:1508.04752\n                      \n                     (2015)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Busch, A., Strittmatter, M., Koziolek, A.: Assessing security to compare architecture alternatives of component-based systems. In: International Conference on Software Quality, Reliability and Security. IEEE (2015)","DOI":"10.1109\/QRS.2015.24"},{"key":"11_CR7","unstructured":"Colbert, E., Boehm, B.: Cost estimation for secure software & systems. In: ISPA\/SCEA 2008 Joint International Conference (2008)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"De Gooijer, T., Jansen, A., Koziolek, H., Koziolek, A.: An industrial case study of performance and cost design space exploration. In: International Conference on Performance Engineering. ACM (2012)","DOI":"10.1145\/2188286.2188319"},{"key":"11_CR9","unstructured":"Djatmiko, M., et al.: Privacy-preserving entity resolution and logistic regression on encrypted data. In: Private and Secure Machine Learning (PSML) (2017)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Kang, E.: Design space exploration for security. In: 2016 IEEE Cybersecurity Development (SecDev), pp. 30\u201336. IEEE (2016)","DOI":"10.1109\/SecDev.2016.017"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Klein, G., et al.: seL4: formal verification of an OS kernel. In: Symposium on Operating Systems Principles. ACM (2009)","DOI":"10.1145\/1629575.1629596"},{"key":"11_CR12","unstructured":"Kounev, S., Brosig, F., Huber, N.: The Descartes modeling language. Department of Computer Science, University of Wuerzburg, Technical report (2014)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Koziolek, A., Koziolek, H., Reussner, R.: PerOpteryx: automated application of tactics in multi-objective software architecture optimization. In: Proceedings of the QoSA & ISARCS. ACM (2011)","DOI":"10.1145\/2000259.2000267"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Krichene, J., Boudriga, N., Fatmi, S.: SECOMO: an estimation cost model for risk management projects. In: International Conference on Telecommunications, ConTEL 2003, vol. 2. IEEE (2003)","DOI":"10.1109\/CONTEL.2003.176966"},{"issue":"1\u20134","key":"11_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.peva.2003.07.008","volume":"56","author":"BB Madan","year":"2004","unstructured":"Madan, B.B., Go\u0161eva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Perform. Eval. 56(1\u20134), 167\u2013186 (2004)","journal-title":"Perform. Eval."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Martens, A., Koziolek, H., Becker, S., Reussner, R.: Automatically improve software architecture models for performance, reliability, and cost using evolutionary algorithms. In: International Conference on Performance Engineering (ICPE) (2010)","DOI":"10.1145\/1712605.1712624"},{"key":"11_CR17","unstructured":"Newsome, J., Song, D.X.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: NDSS, vol. 5. Internet Society (2005)"},{"key":"11_CR18","volume-title":"Modeling and Simulating Software Architectures: The Palladio Approach","author":"RH Reussner","year":"2016","unstructured":"Reussner, R.H., et al.: Modeling and Simulating Software Architectures: The Palladio Approach. MIT Press, Cambridge (2016)"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.procs.2015.09.116","volume":"65","author":"A Safwat","year":"2015","unstructured":"Safwat, A., Senousy, M.: Addressing challenges of ultra large scale system on requirements engineering. Procedia Comput. Sci. 65, 442\u2013449 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Sharma, V.S., Trivedi, K.S.: Architecture based analysis of performance, reliability and security of software systems. In: International Workshop on Software and Performance. ACM (2005)","DOI":"10.1145\/1071021.1071046"},{"key":"11_CR21","unstructured":"Willnecker, F., Brunnert, A., Krcmar, H.: Predicting energy consumption by extending the Palladio component model. In: Symposium on Software Performance (2014)"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, M.: LeakMiner: detect information leakage on android with static taint analysis. In: 2012 Third World Congress on Software Engineering (WCSE). IEEE (2012)","DOI":"10.1109\/WCSE.2012.26"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Yasaweerasinghelage, R., Staples, M., Weber, I.: Predicting latency of blockchain-based systems using architectural modelling and simulation. In: International Conference on Software Architecture (ICSA) (2017)","DOI":"10.1109\/ICSA.2017.22"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Yasaweerasinghelage, R., Staples, M., Weber, I., Paik, H.Y.: Predicting the performance of privacy-preserving data analytics using architecture modelling and simulation. In: International Conference on Software Architecture (ICSA) (2018)","DOI":"10.1109\/ICSA.2018.00026"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29983-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T19:28:40Z","timestamp":1567366120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29983-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030299828","9783030299835"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29983-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Software Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecsa2019.univ-lille.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}