Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Towards a More Sustainable Re-engineering of Heterogeneous Distributed Systems Using Cooperating Run-Time Monitors

  • Conference paper
  • First Online:
Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies (ISoLA 2024)

Abstract

We propose an approach to using run-time monitoring for the re-engineering of distributed systems. Our re-engineering method MBRE consists of five steps that provide guidance during a re-engineering. By utilizing run-time monitors that are parametric in a policy, we obtain the flexibility needed for a sustainable integration of monitors. We illustrate this and other features of MBRE at three re-engineering case studies in a hypothetical hospital scenario. A key novelty of our approach is that it supports cooperation between monitors also across technological boundaries. This is of high relevance because, for instance, system components in the IoT often run on different platforms and are implemented in different programming languages. Surprisingly, such scenarios have been outside the focus of the run-time-monitoring community so far.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    We use L1 O1 to denote the shortest path from L1 to O1 according to the floor plan. To denote the next shortest route, we disambiguate by using L1 ML MR O1.

  2. 2.

    In case of an urgent supply shortage, delivering this supply deserves higher priority. We refrain from specifying a use case for such a high-priority task in this article.

  3. 3.

    Should it not be possible to add a run-time monitor to the elevator’s controller, then a different design decision must be made at this step. For instance, a run-time monitor could alternatively be added to a system managing the arrivals and departures on the helipad. Another alternative would be to add sensors elsewhere, e.g., within the elevator or onto the stretchers used for patients arriving at the helipad.

  4. 4.

    This is not the only sensible design choice. Alternatively, one could reserve the critical section earlier (e.g., when L1 is called to Level 15) or later (e.g., when L1 is in emergency mode and passes Level 7 on its way to the basement). Which choice is best depends on multiple factors such as the speed of the elevator, the speed of the supply cart, and the willingness to take risks, and the acceptability of delays.

  5. 5.

    There are manifold alternatives to defining this pre-condition. We perform the re-engineering such that COND-1 can be easily adapted to a different pre-condition.

References

  1. Camunda. https://camunda.com/. Accessed 31 May 2024

  2. Java Microbenchmark Harness (JMH). https://openjdk.org/projects/code-tools/jmh/. Accessed 17 Jul 2024

  3. Adesola, S., Baines, T.: Developing and evaluating a methodology for business process improvement. Bus. Process. Manag. J. 11(1), 37–46 (2005)

    Article  Google Scholar 

  4. Assunção, W.K.G., Lopez-Herrejon, R.E., Linsbauer, L., Vergilio, S.R., Egyed, A.: Reengineering legacy applications into software product lines: a systematic mapping. Empirical Softw. Eng. 22(6), 2972–3016 (2017)

    Article  Google Scholar 

  5. Basin, D.A., Jugé, V., Klaedtke, F., Zalinescu, E.: Enforceable security policies revisited. ACM Trans. Inf. Syst. Secur. 16(1), 3 (2013)

    Article  Google Scholar 

  6. Gay, R., Mantel, H., Sprick, B.: Service Automata. In: Barthe, G., Datta, A., Etalle, S. (eds.) FAST 2011. LNCS, vol. 7140, pp. 148–163. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29420-4_10

    Chapter  Google Scholar 

  7. Hallsteinsen, S., Hinchey, M., Park, S., Schmid, K.: Dynamic software product lines. Computer 41(4), 93–95 (2008)

    Article  Google Scholar 

  8. Hamlen, K.W., Morrisett, J.G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1), 175–205 (2006)

    Article  Google Scholar 

  9. IBM: An architectural blueprint for autonomic computing. Tech. rep. (2006)

    Google Scholar 

  10. Kirikkayis, Y., Winter, M., Reichert, M.: A user study on modeling IoT-aware processes with BPMN 2.0. Information 15(4), 229 (2024)

    Article  Google Scholar 

  11. Laguna, M.A., Crespo, Y.: A systematic mapping study on software product line evolution: from legacy system reengineering to product line refactoring. Sci. Comput. Program. 78(8), 1010–1034 (2013)

    Article  Google Scholar 

  12. Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1–2), 2–16 (2005)

    Article  Google Scholar 

  13. van der Linden, F., Schmid, K., Rommes, E.: Software Product Lines in Action - The Best Industrial Practice in Product Line Engineering. Springer (2007). https://doi.org/10.1007/978-3-540-71437-8

  14. OMG: Business Process Model and Notation (BPMN), Version 2.0.2 (2014). https://www.omg.org/spec/BPMN/2.0.2

  15. Park, J., Sandhu, R.S.: Towards usage control models: beyond traditional access control. In: 7th ACM Symposium on Access Control Models and Technologies, pp. 57–64. ACM (2002)

    Google Scholar 

  16. Pohl, K., Böckle, G., van der Linden, F.: Software Product Line Engineering – Foundations, Principles, and Techniques. Springer (2005). https://doi.org/10.1007/3-540-28901-1

  17. Pretschner, A., Hilty, M., Basin, D.A.: Distributed usage control. Communun. ACM 49(9), 39–44 (2006)

    Article  Google Scholar 

  18. Pretschner, A., Massacci, F., Hilty, M.: Usage control in service-oriented architectures. In: Trust, Privacy and Security in Digital Business, 4th International Conference. LNCS, vol. 4657, pp. 83–93 (2007)

    Google Scholar 

  19. Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)

    Article  Google Scholar 

  20. Schönig, S., Ackermann, L., Jablonski, S., Ermer, A.: IoT meets BPM: a bidirectional communication architecture for IoT-aware process execution. Softw. Syst. Model. 19(6), 1443–1459 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

We thank the anonymous reviewers for their constructive feedback and suggestions. This research work was supported by the National Research Center for Applied Cybersecurity ATHENE. ATHENE is funded jointly by the German Federal Ministry of Education and Research and the Hessian Ministry of Higher Education, Research and the Arts.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maximilian Gehring .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gehring, M., Mantel, H. (2025). Towards a More Sustainable Re-engineering of Heterogeneous Distributed Systems Using Cooperating Run-Time Monitors. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies. ISoLA 2024. Lecture Notes in Computer Science, vol 15222. Springer, Cham. https://doi.org/10.1007/978-3-031-75387-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-75387-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-75386-2

  • Online ISBN: 978-3-031-75387-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics