, ISO/IEC 27000, Information technology and security tech-67

B. Issac and N. Israr, Case studies in secure computing, Achiev. Trends, 2014.

J. Magee and J. Kramer, Dynamic structure in software

, Proceedings of the Fourth ACM SIGSOFT Sympo-71

, sium on Foundations of Software Engineering, FSE'96, vol.72

U. Francisco, , pp.3-14, 1996.

D. C. Luckham, J. L. Kenney, L. M. Augustin, J. Vera, D. Bryan et al., Specification and analysis of system architecture using rapide, IEEE Trans. Softw. Eng, vol.21, issue.4, 1995.

N. R. Mehta, N. Medvidovic, and S. Phadke, Towards a taxonomy of software connectors, in: ICSE'00, pp.178-187, 2000.

D. A. Basin, J. Doser, and T. Norderstedt, Model-driven security: From UML models to access control infrastructures, ACM Trans. Softw. Eng. Methodol, vol.15, issue.1, pp.39-91, 2006.

R. Allen and D. Garlan, A formal basis for architectural connection, ACM Trans. Softw. Eng. Methodol, vol.6, issue.3, 1997.
URL : https://hal.archives-ouvertes.fr/hal-00444067

D. Garlan, R. T. Monroe, and D. Wile, Acme: Architectural description component-based systems, Foundations of Component-Based Systems, pp.47-68, 2000.

M. Derdour, R. Roose, M. Dalmau, N. Zine, and A. Alti, , p.79

, MMSA: Metamodel multimedia software architecture

. Multimed, , p.17, 2010.


, Society of Automotive Engineers, vol.84

, Design Language, AADL, p.85, 2008.

C. Szyperski, Component Software: Beyond Object-Oriented Programming, p.86, 1997.

R. Roshandel and N. Medvidovic, Multi-view software component modeling for dependability, Architecting Dependable Systems II, vol.3069, pp.286-304, 2004.

E. Dashofy, A. Hoek, and R. N. Taylor, A comprehensive approach for the development of XML-based software architecture description languages, ACM Trans. Softw. Eng. Methodol. (TOSEM), vol.14, issue.2, pp.199-245, 2005.

, Unified Modeling Superstructure, OMG, p.89, 2000.

G. Georg, I. Ray, and R. France, Using aspects to design a secure system, The 8 th International Conference on Engineering of Complex Computer Systems (ICECCS '02), p.117, 2002.

J. Jurjens, Towards development of secure systems using UMLsec, Fundamental Approaches to Software Engineering (FASE/ETAPS 2001), in: LNCS, vol.2029, pp.187-200, 2001.

J. Jurjens, J. Jézéquel, H. Hussmann, and S. Cook, UMLsec: Extending UML for secure systems development, UML 2002-The Unified Modeling Language, vol.2460, pp.412-425, 2002.

K. Bergner, A. Rausch, and M. Sihling, A formal model for component ware, Foundations of Component-Based Systems, pp.189-210, 2000.

N. Medvidovic and R. N. Taylor, Classification and comparison framework for software architecture description languages, IEEE Trans. Softw. Eng, vol.26, issue.1, pp.70-93, 2000.
URL : https://hal.archives-ouvertes.fr/hal-00444077

, Unified Modeling Language: Infrastructure, OMG, 2007.

J. Ren and R. N. Taylor, A secure software architecture 20 description language, Workshop on Software Security 21

, Assurance Tools, Techniques, and Metrics, 2005.

M. Shaw, R. Deline, D. V. Klein, T. L. Ross, D. M. Young et al., Abstractions for software architecture and tools to support them, IEEE Trans. Softw. Eng, vol.21, issue.4, pp.314-335, 1995.

A. Amirat and M. Oussalah, First-class connectors to support systematic construction of Hierarchical software architecture, J. Object Technol, vol.8, issue.7, pp.107-130, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00472319

R. Allen, S. Vestal, B. Lewis, and D. Cornhill, Using an architecture description language for quantitative analysis of real-time systems, Proceedings of the Third International Workshop on Software and Performance, pp.203-210, 2002.

S. Graf and I. Ober, How useful is the UML real-time profile SPT 26 without semantics, SIVOES 2004, associated with RTAS, p.27, 2004.

T. Canada, , 2004.

E. Bruneton, T. Coupaye, M. Leclercq, V. Quéma, and J. Stefani, An open component model and its support in Java, CBSE, vol.3054, pp.7-22, 2004.

G. Barber, What is SCA, p.30, 2007.

L. Seinturier, P. Merle, D. Fournier, N. Dolet, V. Schiavoni et al., , vol.32

. Stefani, Reconfigurable SCA applications with the FraSCAti 33 platform, p.34

, Computing, p.35, 2009.

C. Marcel, R. Michel, M. Christian, and L. Calin, , p.36

, Adaptation dynamique de services, Déploiement et, p.37

C. Marcel, R. Michel, and M. Christian, Autonomic adaptation based on service-context adequacy determination, J. Electron. Notes Theoret. Comput. Sci. (ENTCS), pp.35-50, 2007.

E. Maximilien and M. Singh, Self-adjusting trust and selection 40 for web services, IEEE Second International Conference on, p.41

, Autonomic Computing, ICAC'05, pp.385-386, 2005.

D. A. Basin, M. Clavel, J. Doser, and M. Egea, A metamodel-based 43 approach for analyzing security-design models, MoDELS, vol.44, p.45, 2007.

T. Lodderstedt, D. Basin, J. Doser, and . Secureuml, , p.46

, based modeling language for model-driven security, 5th 47 International Conference, p.48, 2002.

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Trans. Dependable Secure Comput, vol.49, pp.11-33, 2004.

S. Balsamo, M. Bernado, and M. Simeoni, Performance evaluation at the architecture level, Formal Methods for Software Architectures, in: LNCS, vol.2804, pp.207-258, 2003.

R. B. Hafner, , p.51, 2009.

M. Q. Saleem, J. Jaafar, and M. F. Hassan, Model driven security 52, p.54, 2010.

T. Acmestudio and . Toolkit, , p.55, 2004.

A. Alti, A. Boukerram, A. Smeda, S. Maillard, and M. Oussalah, COSABuilder and COSAInstantiator: An extensible tool for architectural description, Int. J. Softw. Eng. Knowl. Eng, vol.20, issue.3, pp.423-455, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01140243

M. M. Menzel, Security meta-model for service, p.58

, IEEE International Conference on Services 59

M. Menzel and C. Meinel, SecureSOA modelling security 61 requirements for service-oriented architectures, pp.2010-62

, International Conference on Services Computing, SCC, 2010.