Architectural tactics in software architecture: A systematic mapping study

被引:8
作者
Marquez, Gaston [1 ]
Astudillo, Hernan [2 ]
Kazman, Rick [3 ]
机构
[1] Univ Tecn Federico Santa Maria, Dept Elect & Informat, Concepcion, Chile
[2] Univ Tecn Federico Santa Maria, Dept Informat, Santiago, Chile
[3] Univ Hawaii, Dept Informat Technol Management, Honolulu, HI 96822 USA
基金
美国国家科学基金会;
关键词
Architectural tactics; Systematic mapping study; Software architecture; Quality attributes; SPECIFYING REDUNDANCY TACTICS; REQUIREMENTS; SECURITY; PATTERNS; MODEL;
D O I
10.1016/j.jss.2022.111558
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Architectural tactics are a key abstraction of software architecture, and support the systematic design and analysis of software architectures to satisfy quality attributes. Since originally proposed in 2003, architectural tactics have been extended and adapted to address additional quality attributes and newer kinds of systems, making quite hard for researchers and practitioners to master this growing body of specialized knowledge. This paper presents the design, execution and results of a systematic mapping study of architectural tactics in software architecture literature. The study found 552 studies in well-known digital libraries, of which 79 were selected and 12 more were added with snowballing, giving a total of 91 primary studies. Key findings are: (i) little rigor has been used to characterize and define architectural tactics; (ii) most architectural tactics proposed in the literature do not conform to the original definition; and (iii) there is little industrial evidence about the use of architectural tactics. This study organizes and summarizes the scientific literature to date about architectural tactics, identifies research opportunities, and argues for the need of more systematic definition and description of tactics.Editor's note: Open Science material was validated by the Journal of Systems and Software Open Science Board.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:27
相关论文
共 131 条
  • [1] Adam S., 2016, SEKE, P357, DOI [10.18293/SEKE2016-183, DOI 10.18293/SEKE2016-183]
  • [2] Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective
    Agrawal, Alka
    Seh, Adil Hussain
    Baz, Abdullah
    Alhakami, Hosam
    Alhakami, Wajdi
    Baz, Mohammed
    Kumar, Rajeev
    Khan, Raees Ahmad
    [J]. SYMMETRY-BASEL, 2020, 12 (04):
  • [3] Al Imran MA, 2017, 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (ICECOS), P131, DOI 10.1109/ICECOS.2017.8167119
  • [4] Al-Daajeh S.H., 2012, INT J SOFTW ENG KNOW, V5, P5
  • [5] Al-Daajeh S.H., 2011, ENG DEPENDABILITY EM
  • [6] A Framework for Selecting Architectural Tactics Using Fuzzy Measures
    Alashqar, Abdelkareem M.
    El-Bakry, Hazem M.
    Elfetouh, Ahmad Abo
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2017, 27 (03) : 475 - 498
  • [7] Fault-Detection Tactics for Optimized Embedded Systems Efficiency
    Aldaajeh, Saleh H.
    Harous, Saad
    Alrabaee, Saed
    [J]. IEEE ACCESS, 2021, 9 (09): : 91328 - 91340
  • [8] Alebrahim A., 2015, P 20 EUR C PATT LANG, P39, DOI [10.1145/2855321.2855361, DOI 10.1145/2855321.2855361]
  • [9] Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective
    Alenezi, Mamdouh
    Agrawal, Alka
    Kumar, Rajeev
    Khan, Raees Ahmad
    [J]. IEEE ACCESS, 2020, 8 : 25543 - 25556
  • [10] Alpaydin E., 2020, Introduction to Machine Learning, V4th