This cumulative habilitation thesis, proposes concepts for (i) modelling and analysing dependability based on architectural models of software-intensive systems early in development, (ii) decomposition and composition of modelling languages and analysis techniques to enable more flexibility in evolution, and (iii) bridging the divergent levels of abstraction between data of the operation phase,…
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve t…
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data f…
The concept of information freshness has developed over the last few years into an active and rapidly growing area of research. It has become known as the Age of Information (AoI). After its initial formal introduction, it became clear that it was very relevant (if not crucial) for numerous applications, ranging from autonomous vehicle systems, the Internet of Things, real-time computing to dat…
This open access book aims to provide the reader with some basic insight into the AI Act (REGULATION (EU) 2024/1689) and its relevance for the development of high-risk AI systems. It covers all aspects relevant in a safety plan that should serve as the foundation for developing future safety cases for AI safety systems. The topics include e.g. the system definition; hardware, software and its l…
Organizations must gain insights into often fragmented and isolated data assets and overcome data silos to profitably leverage data as a strategic resource. Data catalogs are an increasingly popular approach to achieving these objectives. Despite the perceived importance of data catalogs in practice, relatively little research exists on how to design corporate data catalogs. It is also obvi…
This open access book constitutes the proceedings of the 28th International Conference on Fundamental Approaches to Software Engineering, FASE 2025, which was held as part of the International Joint Conferences on Theory and Practice of Software, ETAPS 2025, in Hamilton, Canada, in May 2025. The 9 full and 2 short papers included in the proceedings, together with one invited keynote paper an…
The chapter discusses the importance of quantum software and defines it as a multifaceted concept comprising a theoretical, engineering, and application viewpoint. Hence, it covers aspects of quantum software theory, quantum software systems, as well as quantum software laboratory. The chapter also outlines the entire book and its individual chapters structured into three parts on quantum s…
This open access book presents the outcomes of the “Design for Future – Managed Software Evolution” priority program 1593, which was launched by the German Research Foundation (“Deutsche Forschungsgemeinschaft (DFG)”) to develop new approaches to software engineering with a specific focus on long-lived software systems. The different lifecycles of software and hardware platforms lead …
This open access book coherently gathers well-founded information on the fundamentals of and formalisms for modelling cyber-physical systems (CPS). Highlighting the cross-disciplinary nature of CPS modelling, it also serves as a bridge for anyone entering CPS from related areas of computer science or engineering. Truly complex, engineered systems—known as cyber-physical systems—that integr…