An architectural framework for analyzing tradeoffs between software security and performance.

Conference paper


Cortellessa, V., Trubiani, C., Mostarda, L. and Dulay, N. 2010. An architectural framework for analyzing tradeoffs between software security and performance. ISARCS 2010: 1st International Symposium on Architecting Critical Systems Federated with CompArch 2010. Prague 23 - 25 Jun 2010 pp. 1-18
TypeConference paper
TitleAn architectural framework for analyzing tradeoffs between software security and performance.
AuthorsCortellessa, V., Trubiani, C., Mostarda, L. and Dulay, N.
Abstract

The increasing complexity of software systems entails large
effort to jointly analyze their non-functional attributes in order to identify potential tradeoffs among them (e.g. increased availability can lead to performance degradation). In this paper we propose a framework for
the architectural analysis of software performance degradation induced by security solutions. We introduce a library of UML models representing security mechanisms that can be composed with performance annotated UML application models for architecting security and performance critical systems. Composability of models allows to introduce different security solutions on the same software architecture, thus supporting software architects to find appropriate security solutions while meeting performance requirements. We report experimental results that validate
our approach by comparing a model-based evaluation of a software architecture for management of cultural assets with values observed on the real implementation of the system.

Research GroupResearch Group on Development of Intelligent Environments
SensoLab group
ConferenceISARCS 2010: 1st International Symposium on Architecting Critical Systems Federated with CompArch 2010
Page range1-18
Publication dates
Print2010
Publication process dates
Deposited30 Mar 2011
Output statusPublished
Web address (URL)http://www.sti.uniurb.it/paco/Products/isarcs_2010.pdf
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/83312

  • 23
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

Threshold signature in off-chain components to manage inter-chain transactions
Bigiotti, A., Mostarda, L., Navarra A, Shah, P. and Trestian, R. 2024. Threshold signature in off-chain components to manage inter-chain transactions. 6th Conference on Blockchain Research & Applications for Innovative Networks and Services. Berlin, Germany 09 - 11 Oct 2024 IEEE. pp. 1-4 https://doi.org/10.1109/brains63024.2024.10732513
Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation
Ullah, F., Ullah, S., Naeem, M., Mostarda, L., Rho, S. and Cheng, X. 2022. Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation. Sensors. 22 (15), pp. 1-26. https://doi.org/10.3390/s22155883
Comparative analysis of clustering algorithms and moodle plugin for creation of student heterogeneous groups in online university courses
Nalli, G., Amendola, D., Perali, A. and Mostarda, L. 2021. Comparative analysis of clustering algorithms and moodle plugin for creation of student heterogeneous groups in online university courses. Applied Sciences. 11. https://doi.org/10.3390/app11135800
A model-driven engineering framework for architecting and analysing Wireless Sensor Networks
Doddapaneni, K., Ever, E., Gemikonakli, O., Malavolta, I., Mostarda, L. and Muccini, H. 2012. A model-driven engineering framework for architecting and analysing Wireless Sensor Networks. Third International Workshop on Software Engineering for Sensor Network Applications (SESENA'12). Zurich, Switzerland 02 Jun 2012 IEEE Press Piscataway, NJ, USA. pp. 1-7 https://doi.org/10.1109/SESENA.2012.6225729
On the performance, availability and energy consumption modelling of clustered IoT systems
Ever, E., Shah, P., Mostarda, L., Omondi, F. and Gemikonakli, O. 2019. On the performance, availability and energy consumption modelling of clustered IoT systems. Computing. 101 (12), pp. 1935-1970. https://doi.org/10.1007/s00607-019-00720-9
Application of machine learning to the learning analytics of the Moodle platform to create heterogeneous groups in on-line courses
Nalli, G., Mostarda, L., Perali, A., Pilati, S. and Amendola, A. 2019. Application of machine learning to the learning analytics of the Moodle platform to create heterogeneous groups in on-line courses. Italian Journal of Educational Research. p. 156–173.
Multi-path routing for mission critical applications in software-defined networks
Ramirez, R., Vien, Q., Trestian, R., Mostarda, L. and Shah, P. 2019. Multi-path routing for mission critical applications in software-defined networks. Duong, T. and Vo, N. (ed.) 14th EAI International Conferenceon Industrial Networks and Intelligent Systems, INISCOM 2018. Da Nang, Vietnam 27 - 28 Aug 2018 Springer, Cham. pp. 38-48 https://doi.org/10.1007/978-3-030-05873-9_4
Analysis and verification of ECA rules in intelligent environments
Cacciagrano, D., Corradini, F., Culmone, R., Gorogiannis, N., Mostarda, L., Raimondi, F. and Vannucchi, C. 2018. Analysis and verification of ECA rules in intelligent environments. Journal of Ambient Intelligence and Smart Environments. 10 (3), pp. 261-273. https://doi.org/10.3233/ais-180487
Does the assumption of exponential arrival distributions in wireless sensor networks hold?
Doddapaneni, K., Tasiran, A., Omondi, F., Ever, E., Shah, P., Mostarda, L. and Gemikonakli, O. 2018. Does the assumption of exponential arrival distributions in wireless sensor networks hold? International Journal of Sensor Networks. 26 (2), pp. 81-100. https://doi.org/10.1504/IJSNET.2018.089258
Symbolic verification of event–condition–action rules in intelligent environments
Vannucchi, C., Diamanti, M., Mazzante, G., Cacciagrano, D., Culmone, R., Gorogiannis, N., Mostarda, L. and Raimondi, F. 2017. Symbolic verification of event–condition–action rules in intelligent environments. Journal of Reliable Intelligent Environments. 3 (2), pp. 117-130. https://doi.org/10.1007/s40860-017-0036-z
Symbolic model-checking for resource-bounded ATL
Alechina, N., Logan, B., Nguyen, H., Raimondi, F. and Mostarda, L. 2015. Symbolic model-checking for resource-bounded ATL. 2015 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2015. Istanbul, Turkey 04 - 08 May 2015 pp. 1809-1810
Implementing adaptation and reconfiguration strategies in heterogeneous WSN
Di Marco, A., Gallo, F., Gemikonakli, O., Mostarda, L. and Raimondi, F. 2013. Implementing adaptation and reconfiguration strategies in heterogeneous WSN. 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013 IEEE. pp. 477-483 https://doi.org/10.1109/AINA.2013.102
Packet arrival analysis in wireless sensor networks
Doddapaneni, K., Shah, P., Ever, E., Tasiran, A., Omondi, F., Mostarda, L. and Gemikonakli, O. 2015. Packet arrival analysis in wireless sensor networks. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2015. Gwangiu, South Korea 24 - 27 Mar 2015 IEEE. pp. 164-169 https://doi.org/10.1109/WAINA.2015.101
Effects of IDSs on the WSNs lifetime: evidence for the need of new approaches
Doddapaneni, K., Ever, E., Gemikonakli, O. and Mostarda, L. 2012. Effects of IDSs on the WSNs lifetime: evidence for the need of new approaches. The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Liverpool, United Kingdom 25 - 27 Jun 2012 IEEE. pp. 907-912 https://doi.org/10.1109/TrustCom.2012.137
UHEED - an unequal clustering algorithm for wireless sensor networks
Ever, E., Luchmun, R., Mostarda, L., Navarra, A. and Shah, P. 2012. UHEED - an unequal clustering algorithm for wireless sensor networks. Sensornets 2012. Rome, Italy 24 - 26 Feb 2012
DALICA: intelligent agents for user profile deduction.
Costantini, S., Mostarda, L., Tocchio, A., Tsintza, P. and Knowledge Systems Institute Graduate School. 2007. DALICA: intelligent agents for user profile deduction. I. Illinois Knowledge Systems Institute Graduate School,.
Agents and security in a cultural assets transport scenario.
Costantini, S., Mostarda, L., Tocchio, A. and Tsintza, P. 2007. Agents and security in a cultural assets transport scenario. Workshop from Objects to Agents.. Genova, Italy 24 - 25 Sep 2007
A geo time authentication system.
Mostarda, L., Tocchio, A., Inverardi, P. and Costantini, S. 2007. A geo time authentication system. Springer. https://doi.org/10.1007/978-0-387-73655-6_9
Place and time authentication of cultural assets.
Mostarda, L., Dong, C. and Dulay, N. 2008. Place and time authentication of cultural assets. Springer.
A state machine-based approach for reliable adaptive distributed systems.
Mostarda, L., Sykes, D. and Dulay, N. 2010. A state machine-based approach for reliable adaptive distributed systems. Sterritt, R. and McCann, J. (ed.) IEEE. https://doi.org/10.1109/EASe.2010.19
A policy-based publish/subscribe middleware for sense-and-react applications
Russello, G., Mostarda, L. and Dulay, N. 2011. A policy-based publish/subscribe middleware for sense-and-react applications. Journal of Systems and Software. 84 (4), pp. 638-654. https://doi.org/10.1016/j.jss.2010.10.023
A distributed intrusion detection approach for secure software architecture.
Inverardi, P. and Mostarda, L. 2005. A distributed intrusion detection approach for secure software architecture. Springer. https://doi.org/10.1007/11494713_12
Synthesis of correct and distributed adaptors for component-based systems: an automatic approach.
Inverardi, P., Mostarda, L., Tivoli, M. and Autili, M. 2005. Synthesis of correct and distributed adaptors for component-based systems: an automatic approach. IEEE. pp. 405-409
A distributed monitoring system for enhancing security and dependability at architectural level.
Inverardi, P. and Mostarda, L. 2007. A distributed monitoring system for enhancing security and dependability at architectural level. Springer. https://doi.org/10.1109/AINA.2006.145
Distributed IDSs for enhancing security in mobile wireless sensor networks.
Inverardi, P., Mostarda, L. and Navarra, A. 2006. Distributed IDSs for enhancing security in mobile wireless sensor networks. 20th International Conference on Advanced Information Networking and Applications (AINA). IEEE. pp. 116-120 https://doi.org/10.1109/AINA.2006.145
DESERT: a decentralized monitoring tool generator.
Inverardi, P. and Mostarda, L. 2007. DESERT: a decentralized monitoring tool generator. IEEE.
Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems
Autili, M., Mostarda, L., Navarra, A. and Tivoli, M. 2008. Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems. Journal of Systems and Software. 81 (12), pp. 2210-2236. https://doi.org/10.1016/j.jss.2008.04.006
Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks.
Mostarda, L. and Navarra, A. 2008. Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks. International Journal of Distributed Sensor Networks. 4 (2), pp. 83-109. https://doi.org/10.1080/15501320802001119
DALICA: Agent-based ambient intelligence for cultural-heritage scenarios
Costantini, S., Mostarda, L., Tocchio, A. and Tsintza, P. 2008. DALICA: Agent-based ambient intelligence for cultural-heritage scenarios. IEEE Intelligent Systems. 23 (2), pp. 34-41. https://doi.org/10.1109/MIS.2008.24
ESCAPE: a component-based policy framework for sense and react applications.
Russello, G., Mostarda, L. and Dulay, N. 2008. ESCAPE: a component-based policy framework for sense and react applications. Springer. https://doi.org/10.1007/978-3-540-87891-9_14
Policies for self tuning home networks.
Pediaditakis, D., Mostarda, L., Dong, C. and Dulay, N. 2009. Policies for self tuning home networks. POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks.. London 20 - 22 Jul 2009 pp. 29-32
Context-based authentication and transport of cultural assets.
Mostarda, L., Dong, C. and Dulay, N. 2010. Context-based authentication and transport of cultural assets. Personal and Ubiquitous Computing. 14 (4), pp. 321-334. https://doi.org/10.1007/s00779-009-0233-8
Distributed fault tolerant controllers
Mostarda, L., Ball, R. and Dulay, N. 2010. Distributed fault tolerant controllers. Springer. https://doi.org/10.1007/978-3-642-13645-0_11
Distributed orchestration of pervasive services.
Mostarda, L., Marinovic, S. and Dulay, N. 2010. Distributed orchestration of pervasive services. and Applications. IEEE. pp. 166-173 https://doi.org/10.1109/AINA.2010.100