Context for Managed Evolution

  • Frank J. FurrerEmail author


In the previous chapter, architecture principles have been introduced, explained, and justified. A number of essential architecture principles are defined in part 2. Architecture principles are the treasure of modern software architecting, distilled from decades of experience and valuable work of many architects. In order to generate the impact on actual systems, they must be taught, ingrained into the development process, and finally enforced. The organization of the company must be geared toward Principle-Based Architecting. The strategy of Managed Evolution, paired with Principle-Based Architecting, forms a robust ecosystem for the creation, maintenance, and evolution of today’s complex software-systems. This chapter introduces the context for the Managed Evolution, i.e., the most important processes to successfully implement Managed Evolution and Principle-Based Architecting.


  1. [Abran10]
    Abran A (2010) Software metrics and software metrology. Wiley, Piscataway. ISBN 978-0-470-59720-0CrossRefGoogle Scholar
  2. [Annighoefer15]
    Annighoefer B (2015) Model-based architecting and optimization of distributed integrated modular avionics. Shaker, Aachen. ISBN 978-3-8440-3420-2Google Scholar
  3. [Aroms12]
    Aroms E (2012) NIST Special Publication 800-55 Rev1: Security Metrics Guide for Information Technology Systems. CreateSpace Independent Publishing Platform, Scotts Valley. ISBN 978-1-4701-5204-8Google Scholar
  4. [Autosar17]
    AUTOSAR (2017) Consortium: AUTOSAR—Layered Architecture Accessed 11 Mar 2018
  5. [Beijer10]
    Beijer P, de Klerk T (2010) IT architecture—essential practices for IT business solutions. ISBN 978-1-4457-0603-0
  6. [Boar99]
    Boar BH (1999) Constructing blueprints for enterprise IT architectures. Wiley, New York. ISBN 978-0-471-29620-1Google Scholar
  7. [Brotby08]
    Brotby WK (2008) Information security management metrics—a definitive guide to effective security monitoring and measurement. Taylor & Francis Ltd, Boca Raton. ISBN 978-1-420-05285-5Google Scholar
  8. [Brotby13]
    Brotby WK, Hinson G (2013) PRAGMATIC security metrics—applying metametrics to information security. Taylor & Francis Ltd., Boca Raton. ISBN 978-1-439-88152-1Google Scholar
  9. [Cameron11]
    Cameron KS, Quinn RE (2011) Diagnosing and changing organizational culture: based on the competing values framework, 3rd edn. Jossey-Bass Publishers, San Francisco. ISBN 978-0-4706-5026-4Google Scholar
  10. [Czarnecki17]
    Czarnecki C, Dietze C (2017) Reference architecture for the telecommunications industry: transformation of strategy, organization, processes, data, and applications. Springer, Cham. ISBN 978-3-319-46755-9CrossRefGoogle Scholar
  11. [Dyer18]
    Dyer C (2018) The power of company culture: how any business can build a culture that improves productivity, performance and profits. Kogan Page Publishers, London. ISBN 978-0-749-48195-7Google Scholar
  12. [Ejiogu05]
    Ejiogu LO (2005) Software metrics—the discipline of software quality. Booksurge Publishing, Charleston. ISBN 978-1-4196-0242-9Google Scholar
  13. [Eusgeld08]
    Eusgeld I (2008) Dependability metrics—advanced lecture (GI-Dagstuhl Research Seminar, 2005), Springer Lecture Notes in Computer Science. ISBN 978-3-540-68946-1Google Scholar
  14. [Eveleens06]
    Eveleens RLC (2006) Open systems integrated modular avionics—the real thing mission systems engineering, pp. 2-1–2-22. National Aerospace Laboratory, Report RTO-EN-SCI-176. Accessed 11 Apr 2018
  15. [Fenton15]
    Fenton N, Bieman J (2015) Software metrics - a rigorous and practical approach. Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series, 3rd edn. ISBN 978-1-439-83822-8Google Scholar
  16. [Francis14]
    Francis R, Bekera B (2014) A metric and frameworks for resilience analysis of engineered and infrastructure systems. Reliability Engineering and System Safety. 121(2014), 90–103. Accessed 3 Sep 2017]
  17. [Genero05]
    Genero M, Piattini M, Calero C (2005) (eds.) Metrics for software conceptual models. Imperial College Press, London. ISBN 978-1-8609-4497-0Google Scholar
  18. [Goffee03]
    Goffee R, Jones G (2003) The character of a corporation – how your company’s culture can make or break your business, 2 edn. Profile Books, Ltd., London. ISBN 978-1-86197-639-0Google Scholar
  19. [Gupta17]
    Gupta R (2017) Measurement of software quality factors using CK metrics. LAP LAMBERT Academic Publishing, Saarbrücken. ISBN 978-3-6598-9331-5Google Scholar
  20. [Halvorson16]
    Halvorson C (2016) People Management: everything you need to know about managing and leading people at work. CreateSpace Independent Publishing Platform. ISBN 978-1-5229-7235-8Google Scholar
  21. [Hayden10]
    Hayden L (2010) IT security metrics—a practical framework for measuring security and protecting data. McGraw-Hill Education Ltd., New York. ISBN 978-0-071-71340-5Google Scholar
  22. [Heidel17]
    Heidel R, Hoffmeister M, Hankel M, Döbrich U (2017) Basiswissen RAMI 4.0: Referenzarchitekturmodell und Industrie 4.0-Komponente. Beuth-Verlag, Berlin. ISBN 978-3-41026-482-8Google Scholar
  23. [Herrmann07]
    Herrmann DS (2007) Complete guide to security and privacy metrics—measuring regulatory compliance, operational resilience, and ROI. Auerbach Publishers Inc., Boca Raton. ISBN 978-0-8493-5402-1CrossRefGoogle Scholar
  24. [Janicak15]
    Janicak CA (2015) Safety metrics—tools and techniques for measuring safety performance. Bernan Print, Maryland. Revised edition, . ISBN 978-1-5988-8754-9Google Scholar
  25. [Jaquith07]
    Jaquith A (2007) Security Metrics – Replacing Fear, Uncertainty, and Doubt Addison-Wesley Professional, USA, ISBN 978-0-321-34998-9Google Scholar
  26. [Jones03]
    Jones G, Goffee R (2003) The character of a corporation: How your company’s culture can make or break your business. Profile Books Ltd., London. ISBN 978-1-8619-7639-0Google Scholar
  27. [Jones17]
    Jones C (2017) A guide to selecting software measures and metrics. Taylor & Francis Ltd., Boca Raton. ISBN 978-1-138-03307-8CrossRefGoogle Scholar
  28. [Kan02]
    Kan SH (2002) Metrics and models in software engineering, 2nd edn. Addison-Wesley Longman, Amsterdam. ISBN 978-0-201-72915-3Google Scholar
  29. [Mateski17]
    Mateski M, Trevino CM, Veitsch CK, Harris M, Maruoka S, Frye J (2017) Cyber threat metrics. CreateSpace Independent Publishing Platform. ISBN 978-1-5424-7775-8Google Scholar
  30. [Murer11]
    Murer S, Bonati B, Furrer FJ (2011) Managed evolution—a strategy for very large information systems. Springer, Heidelberg. ISBN 978-3-642-01632-5CrossRefGoogle Scholar
  31. [Oo11]
    Thida O, Aung KO (2011) Analyzing object-oriented systems with software quality metrics—an empirical study for software maintainability. LAP LAMBERT Academic Publishing, Saarbrücken. ISBN 978-3-8433-7748-5Google Scholar
  32. [Poulin97]
    Poulin JS (1997) Measuring software reuse – principles, practices, and economic models. Addison Wesley Longman, Reading. ISBN 0-201-63413-9Google Scholar
  33. [Ross06]
    Ross JW, Weill P, Robertson DC (2006) Enterprise Architecture as Strategy—Creating a Foundation for Business Execution. Harvard Business Review Press, Boston. ISBN 978-1-5913-9839-4Google Scholar
  34. [Scheid15]
    Scheid O (2015) AUTOSAR compendium, Part 1: application & RTE. CreateSpace Independent Publishing Platform, Bruchsal. ISBN 978-1-5027-5152-2Google Scholar
  35. [TOGAF11]
    The open group (2011) TOGAF® Version 9.1, 10th edn. Van Haren Publishing, Zaltbommel. ISBN 978-9-0875-3679-4Google Scholar
  36. [Wong00]
    Wong C (2000) Security metrics - a beginner’s guide. Osborne Publisher, New York. ISBN 978-0-071-74400-3Google Scholar
  37. [Wout10]
    van’t Wout J, Waage M, Hartman H, Stahlecker M, Hofmann A (2010) The integrated architecture framework explained: why, what, how. Springer, Berlin. ISBN 978-3-642-11517-2CrossRefGoogle Scholar
  38. [Young10]
    Young C (2010) Metrics and methods for security risk management. Syngress Publishing, Burlington. ISBN 978-1-8561-7978-2Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Computer Science FacultyTechnical University of DresdenDresdenGermany

Personalised recommendations