Change search
ReferencesLink to record
Permanent link

Direct link
Defining a method for identifying architectural candidates as part of engineering a system architecture
RISE, Swedish ICT, SICS, Security Lab. SICS.
Number of Authors: 4
2014 (English)Conference paper (Refereed)
Abstract [en]

Engineering system architectures for complex systems involves the tasks of analyzing architectural drivers, identifying architectural concerns, identifying valid architecture candidates, and evaluation of alternatives. One problem to overcome when architecting a system is the identification of valid of architectural candidates. We have developed a step-wise method for performing system architecture analysis and tested it on a sub-system in a project developing a drive system for heavy automotive applications. In this paper we present the complete method of nine steps for engineering an architecture and we elaborate in detail on the procedure to identify architectural candidates based on previously identified architectural drivers. We present a diagram depicting the proposed information model, its concepts and their relationships. In addition, the expectations on such a method as expressed by practitioners have been elicited, and we elaborate on the validity by examining how well the method indicate fulfillment. Our conclusion is that the proposed method does not fail to deliver on any of the needs and this gives an indication of usefulness. When identifying architectural candidates it is important to use proper criteria in the process. Our conclusion is that the practitioners should focus on candidates that affect the system at hand (within system boundaries), and on the candidates that address the architecturally significant system use. This is reflected in our method where we prescribe evaluation of the design candidates by validating that they solve only the right problem and by ensuring that they address the system at hand.

Place, publisher, year, edition, pages
2014, 14.
National Category
Computer and Information Science
URN: urn:nbn:se:ri:diva-15577OAI: diva2:1036894
Systems Conference (SysCon), 2014 8th Annual IEEE
Available from: 2016-10-13 Created: 2016-10-13

Open Access in DiVA

fulltext(276 kB)4 downloads
File information
File name FULLTEXT01.pdfFile size 276 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
Security Lab
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 4 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

ReferencesLink to record
Permanent link

Direct link