An architectural style for trustworthy adaptive service based applications

Leszek A. Maciaszek*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)


Stakeholders demand trustworthy information systems. Trust is a subjective but strong belief in the ability of a system to perform dependably within a specified context defined by (necessarily changing) functional and nonfunctional requirements. Trust assumes satisfaction of various quality goals (including reliability, security, accuracy, efficiency, but also adaptability). A necessary condition for a trustworthy system is to build it based on a complexity-minimizing architectural style. This paper presents a layered/tiered architectural style for construction of service based applications such that dependencies between software elements are constrained to allow lifecycle management of software complexity. The presented style is an extension of the author's PCBMER (Presentation, Controller, Bean, Mediator, Entity, and Resource) meta-architecture for custom software systems.

Original languageEnglish
Title of host publicationBusiness System Management and Engineering
EditorsClaudio A. Ardagna, Ernesto Damiani, Leszek A. Maciaszek, Michele Missikoff, Michael Parkin
Place of PublicationHeidelberg, Germany
PublisherSpringer, Springer Nature
Number of pages13
Volume7350 LNCS
ISBN (Print)9783642324383
Publication statusPublished - 2012
EventInternational Workshop on Business System Management and Engineering, BSME 2010 - Malaga, Spain
Duration: 28 Jun 201028 Jun 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7350 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349


OtherInternational Workshop on Business System Management and Engineering, BSME 2010


Dive into the research topics of 'An architectural style for trustworthy adaptive service based applications'. Together they form a unique fingerprint.

Cite this