Auflistung nach Autor:in "Lehrig, Sebastian"
1 - 3 von 3
Treffer pro Seite
Sortieroptionen
- ZeitschriftenartikelExtensible Graphical Editors for Palladio(Softwaretechnik-Trends Band 36, Heft 4, 2016) Strittmatter, Misha; Junker, Michael; Rostami, Kiana; Lehrig, Sebastian; Kechaou, Amine; Liu, Bo; Heinrich, RobertPalladio is an approach to design and performance prediction of software architectures. An important part of the Palladio’s tooling — the Palladio Bench — are its graphical GMF-based editors. In contrast to rudimentary tree-based editors, they enable a more intuitive creation of models even for less experienced developers. However, the maintenance of the GMFbased editors has become cumbersome because the requirement arose to support an increasing amount of new language features. In this paper, we present the new generation of graphical editors for Palladio, which are based on the Sirius editor framework. Further, we present a concept of how to develop external extensions to the graphical language, which can be plugged into the new editors without the need to intrusively modify them.
- ZeitschriftenartikelReengineering of Component-Based Software Systems in the Presence of Design Deficiencies – An Overview(Softwaretechnik-Trends: Vol. 33, No. 2, 2013) Detten, Markus; Lehrig, Sebastian
- ZeitschriftenartikelSecurity Modeling with Palladio—Different Approaches(Softwaretechnik-Trends Band 36, Heft 4, 2016) Hilbrich, Marcus; Frank, Markus; Lehrig, SebastianSecurity is never perfect, security deals with a lot of uncertainty, and security is complex. Nevertheless, security is one of the non-functional properties, that we, as software architects, have to consider. It is needed to include security in many trade-off decisions (usability, performance, costs, etc. versus security), to compare the security of different architectures, and to check whether legal constraints are meet. Thus it is demanded to include security modeling to approaches like Palladio. In this paper, we describe two approaches to model and analyze security using Palladio. The first approach is an external one and requires to adapt Palladio. The second approach is proposed by us and does not need to modify Palladio. Furthermore, we explain why we needed to develop a new approach based on a use case and its demanded pragmatism for the model.