Jetzt einreichen: "Digital Pro Bootcamp" - Neue IT-Qualifizierungsförderung mehr...

Neue Initiativen für Gründerinnen & Forscherinnen von INiTS mehr...

Laura Bassi 4.0 - Frauen gestalten chancengerechte Digitalisierung: 1. Ausschreibung startet am 19.10.2018 mehr...

29.10.2018: FEMtech Netzwerktreffen "Ist Diversität der Ersatz für Gender?", Wien mehr...


Collaborative systems support the cooperation of stakeholders across organisations and system boundaries. Due to their evolving nature and their strong quality requirements (e.g. concerning security and dependability) the engineering of collaborative systems poses immense challenges.

Living Models strives to a model-based methodology for the continuous quality management of collaborative systems.

Living Models

Living Models focuses on model-based management, design and operation of dynamically evolving systems.

In order to materialise an integrated view three major research challenges have to be met.

  • To provide a coherent view of the quality status of the system (integrating the perspectives of all stakeholders, ranging from the IT managers and the software engineers to the system administrators)
  • To keep track of the quality status while the system evolves
  • To support the collaboration of stakeholders for achieving the necessary quality level

A Living Models environment makes rigorous use of models to bridge the gap between the domains and the related stakeholders.

Living Models provides a fully change-driven process for managing, designing and operating IT systems.

Living Landscape Models

Living Landscape Models focus on the tasks of IT managers to analyse and to manage IT landscapes in the context of business processes and organisational structures.

Based on the open source tool iteraplan we are developing a Living Models environment in which the following needs will be addressed.

  • IT Landscape Models are tightly coupled with the runtime environment
  • Sensors in the runtime environment deliver information supporting the planning activities of IT managers
  • An integrated framework for models and key figures supports the monitoring of IT landscapes

Living Quality Management

In the context of iterative software development and continuous system evolution effective test management is crucial for obtaining high quality systems. The goal of Living Quality Management is to develop a tool-based method for risk-based quality management with a focus on optimising test case selection and test prioritisation.

On the one hand side this concerns the derivation and prioritisation of test cases based on metrics and key figures analysing data from different sources. This includes information from runtime (e.g. frequently running modules), the result of recent test executions in regression testing, static code analysis and requirements specification.

On the other side we will consider the embedding of testing aspects in the whole software process. In particular we will focus on aspects of traceability (e.g. relationship of test cases with requirements, software architecture descriptions, change management and the code) and will develop concepts for the state-based management of test cases.

Living Security Models

Living Security Models aim at the configuration and monitoring of security services in open systems based on domain-level models. This primarily addresses the needs of security policy makers responsible for the specification of security policies in the context of business processes and organisational structures. 

This goal is achieved with a framework operating according to the principles of model-based security engineering. According to this paradigm, the functional behaviour of service oriented systems is captured in high-level models and enhanced by security patterns. The specification is translated into executable security artefacts that configure security components in target systems. The main objectives of Living Security Models are

  • the integration of privacy concerns,
  • the integration of integrity and accountability concerns related to the long-term storage of sensitive data
  • the integration of concepts for monitoring policy compliance
  • leveraging the benefits of architectures offering security functionality as reusable services