Current and emerging topics in software architecture (ECSA 2010 Workshops Summary)

Since 2004 in St. Andrews (Scotland, U.K.), ECSA the European Conference on Software Architecture (formerly EWSA, the European Workshop on Software Architecture) has been considered as an important meeting point for researchers and practitioners on the topic of software architecture. ECSA has matured from a workshop format to a full software engineering conference in the subfield of software architecture. This year, ECSA has become more ambitious and expanded its scope and schedule up to four full days. The program includes a series of tutorials, a doctoral mentoring program, and four full-day workshops. New and existing software challenges have led to a variety of trends in software architecture research, which makes the conference and workshops more attractive and promotes the discussion on current and emerging topics. Based on the scientific and technical interest of the topics, the innovativeness of workshop topics, and the capacity of the conference workshop program, the workshop co-chairs selected four workshops from the nine submitted proposals. We summarize the aims and goals of each workshop and the contributions accepted for the four workshops: • 2nd International Workshop on Software Ecosystems (EcoSys). Piers Campbell, Faheem Ahmed, Jan Bosch, Sliger Jansen. • 1st International Workshop on Measurability of Security in Software Architectures (MeSSa). Reijo Savola, Teemu Kranstén, Antti Evesti. • 8th Nordic Workshop on Model Driven Software Engineering (NW-MODE). Andrzej Wasowski, Dragos Truscan, Ludwik Kuzniarz. • 1st International Workshop on Variability in Software Product Line Architectures (VARI-ARCH). Alexander Helleboogh, Paris Avgeriou, Nelis Boucke, Patryck Heymans. The ECSA 2010 Workshop co-chairs would like to thanks all workshop organizers for their effort and enthusiasm to attract submission in different software architecture research topics and make the ECSA 2010 workshops a success.

[1]  Matthias Galster Describing variability in service-oriented software product lines , 2010, ECSA '10.

[2]  James D. Herbsleb,et al.  Architecting in software ecosystems: interface translucence as an enabler for scalable collaboration , 2010, ECSA '10.

[3]  Arne-Kristian Groven,et al.  Security measurements within the framework of quality assessment models for free/libre open source software , 2010, ECSA '10.

[4]  Stefan Biffl,et al.  Software ecosystems vs. natural ecosystems: learning from the ingenious mind of nature , 2010, ECSA '10.

[5]  Rich Hilliard On representing variation , 2010, ECSA '10.

[6]  Ivan Porres,et al.  Modeling a composite RESTful web service with UML , 2010, ECSA '10.

[7]  Andrew Wang,et al.  On the effectiveness of the metamorphic shield , 2010, ECSA '10.

[8]  Habtamu Abie,et al.  Applicability of security metrics for adaptive security management in a universal banking hub system , 2010, ECSA '10.

[9]  Mario Piattini,et al.  A comparison of software design security metrics , 2010, ECSA '10.

[10]  Mikko Särelä,et al.  Risk analysis of host identity protocol: using risk Identification Method based on Value Chain Dynamics Toolkit , 2010, ECSA '10.

[11]  Barry P. Mulcahy,et al.  Trust-terms ontology for defining security requirements and metrics , 2010, ECSA '10.

[12]  Borislava I. Simidchieva,et al.  Categorizing and modeling variation in families of systems: a position paper , 2010, ECSA '10.

[13]  Harald Störrle,et al.  Model driven development of user interface prototypes: an integrated approach , 2010, ECSA '10.

[14]  Miroslaw Staron,et al.  Characterizing model usage in embedded software engineering: a case study , 2010, ECSA '10.

[15]  Slinger Jansen,et al.  Increasing software product reusability and variability using active components: a software product line infrastructure , 2010, ECSA '10.

[16]  Jari Peltonen,et al.  From a freeform graphics tool to a repository based modeling tool , 2010, ECSA '10.

[17]  Andreas Prinz,et al.  Specification of modelling languages in a flexible meta-model architecture , 2010, ECSA '10.

[18]  Fatma Krichen,et al.  Model-based engineering for dynamic reconfiguration in DRTES , 2010, ECSA '10.

[19]  Christian Jung,et al.  Indicator-based architecture-level security evaluation in a service-oriented environment , 2010, ECSA '10.

[20]  Slinger Jansen,et al.  Software ecosystems: a software ecosystem strategy assessment model , 2010, ECSA '10.

[21]  Luiz Fernando Capretz,et al.  Integrating recommender information in social ecosystems decisions , 2010, ECSA '10.

[22]  Moussa Ouedraogo,et al.  Towards an abstraction layer for security assurance measurements: (invited paper) , 2010, ECSA '10.

[23]  Faheem Ahmed,et al.  A three-dimensional view of software ecosystems , 2010, ECSA '10.

[24]  Rodrigo Pereira dos Santos,et al.  Revisiting the concept of components in software engineering from a software ecosystem perspective , 2010, ECSA '10.

[25]  Jan Bosch,et al.  Architecture challenges for software ecosystems , 2010, ECSA '10.

[26]  Fabio Martinelli,et al.  Formal approach to security metrics.: what does "more secure" mean for you? , 2010, ECSA '10.

[27]  Jesper Andersson,et al.  On the role of software process modeling in software ecosystem design , 2010, ECSA '10.

[28]  Kimmo Hätönen,et al.  Towards holistic security management through coherent measuring , 2010, ECSA '10.

[29]  Pim van den Broek,et al.  A model for variability design rationale in SPL , 2010, ECSA '10.

[30]  Jani Suomalainen,et al.  Secure information sharing between heterogeneous embedded devices , 2010, ECSA '10.

[31]  Antti Evesti,et al.  Towards micro architecture for security adaptation , 2010, ECSA '10.

[32]  Slinger Jansen,et al.  Evaluating architectural openness in mobile software platforms , 2010, ECSA '10.

[33]  Dominik Seichter,et al.  Knowledge management in software ecosystems: software artefacts as first-class citizens , 2010, ECSA '10.

[34]  John D. McGregor A method for analyzing software product line ecosystems , 2010, ECSA '10.

[35]  Harald Störrle Towards clone detection in UML domain models , 2010, ECSA '10.

[36]  Muhammad Ali Babar,et al.  Modeling security for service oriented applications , 2010, ECSA '10.