Abstract
We propose an approach to using run-time monitoring for the re-engineering of distributed systems. Our re-engineering method MBRE consists of five steps that provide guidance during a re-engineering. By utilizing run-time monitors that are parametric in a policy, we obtain the flexibility needed for a sustainable integration of monitors. We illustrate this and other features of MBRE at three re-engineering case studies in a hypothetical hospital scenario. A key novelty of our approach is that it supports cooperation between monitors also across technological boundaries. This is of high relevance because, for instance, system components in the IoT often run on different platforms and are implemented in different programming languages. Surprisingly, such scenarios have been outside the focus of the run-time-monitoring community so far.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
We use L1 O1 to denote the shortest path from L1 to O1 according to the floor plan. To denote the next shortest route, we disambiguate by using L1 ML MR O1.
- 2.
In case of an urgent supply shortage, delivering this supply deserves higher priority. We refrain from specifying a use case for such a high-priority task in this article.
- 3.
Should it not be possible to add a run-time monitor to the elevator’s controller, then a different design decision must be made at this step. For instance, a run-time monitor could alternatively be added to a system managing the arrivals and departures on the helipad. Another alternative would be to add sensors elsewhere, e.g., within the elevator or onto the stretchers used for patients arriving at the helipad.
- 4.
This is not the only sensible design choice. Alternatively, one could reserve the critical section earlier (e.g., when L1 is called to Level 15) or later (e.g., when L1 is in emergency mode and passes Level 7 on its way to the basement). Which choice is best depends on multiple factors such as the speed of the elevator, the speed of the supply cart, and the willingness to take risks, and the acceptability of delays.
- 5.
There are manifold alternatives to defining this pre-condition. We perform the re-engineering such that COND-1 can be easily adapted to a different pre-condition.
References
Camunda. https://camunda.com/. Accessed 31 May 2024
Java Microbenchmark Harness (JMH). https://openjdk.org/projects/code-tools/jmh/. Accessed 17 Jul 2024
Adesola, S., Baines, T.: Developing and evaluating a methodology for business process improvement. Bus. Process. Manag. J. 11(1), 37–46 (2005)
Assunção, W.K.G., Lopez-Herrejon, R.E., Linsbauer, L., Vergilio, S.R., Egyed, A.: Reengineering legacy applications into software product lines: a systematic mapping. Empirical Softw. Eng. 22(6), 2972–3016 (2017)
Basin, D.A., Jugé, V., Klaedtke, F., Zalinescu, E.: Enforceable security policies revisited. ACM Trans. Inf. Syst. Secur. 16(1), 3 (2013)
Gay, R., Mantel, H., Sprick, B.: Service Automata. In: Barthe, G., Datta, A., Etalle, S. (eds.) FAST 2011. LNCS, vol. 7140, pp. 148–163. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29420-4_10
Hallsteinsen, S., Hinchey, M., Park, S., Schmid, K.: Dynamic software product lines. Computer 41(4), 93–95 (2008)
Hamlen, K.W., Morrisett, J.G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1), 175–205 (2006)
IBM: An architectural blueprint for autonomic computing. Tech. rep. (2006)
Kirikkayis, Y., Winter, M., Reichert, M.: A user study on modeling IoT-aware processes with BPMN 2.0. Information 15(4), 229 (2024)
Laguna, M.A., Crespo, Y.: A systematic mapping study on software product line evolution: from legacy system reengineering to product line refactoring. Sci. Comput. Program. 78(8), 1010–1034 (2013)
Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1–2), 2–16 (2005)
van der Linden, F., Schmid, K., Rommes, E.: Software Product Lines in Action - The Best Industrial Practice in Product Line Engineering. Springer (2007). https://doi.org/10.1007/978-3-540-71437-8
OMG: Business Process Model and Notation (BPMN), Version 2.0.2 (2014). https://www.omg.org/spec/BPMN/2.0.2
Park, J., Sandhu, R.S.: Towards usage control models: beyond traditional access control. In: 7th ACM Symposium on Access Control Models and Technologies, pp. 57–64. ACM (2002)
Pohl, K., Böckle, G., van der Linden, F.: Software Product Line Engineering – Foundations, Principles, and Techniques. Springer (2005). https://doi.org/10.1007/3-540-28901-1
Pretschner, A., Hilty, M., Basin, D.A.: Distributed usage control. Communun. ACM 49(9), 39–44 (2006)
Pretschner, A., Massacci, F., Hilty, M.: Usage control in service-oriented architectures. In: Trust, Privacy and Security in Digital Business, 4th International Conference. LNCS, vol. 4657, pp. 83–93 (2007)
Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)
Schönig, S., Ackermann, L., Jablonski, S., Ermer, A.: IoT meets BPM: a bidirectional communication architecture for IoT-aware process execution. Softw. Syst. Model. 19(6), 1443–1459 (2020)
Acknowledgements
We thank the anonymous reviewers for their constructive feedback and suggestions. This research work was supported by the National Research Center for Applied Cybersecurity ATHENE. ATHENE is funded jointly by the German Federal Ministry of Education and Research and the Hessian Ministry of Higher Education, Research and the Arts.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Gehring, M., Mantel, H. (2025). Towards a More Sustainable Re-engineering of Heterogeneous Distributed Systems Using Cooperating Run-Time Monitors. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies. ISoLA 2024. Lecture Notes in Computer Science, vol 15222. Springer, Cham. https://doi.org/10.1007/978-3-031-75387-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-75387-9_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-75386-2
Online ISBN: 978-3-031-75387-9
eBook Packages: Computer ScienceComputer Science (R0)