This project is read-only.

Architecture and Design Inspection Scenarios Frame

- J.D. Meier, Alex Homer, Jason Taylor, Prashant Bansode, Lonnie Wall, Rob Boucher Jr, Akshay Bogawat

Categories

  • Authentication and Authorization
  • Caching
  • Communication
  • Concurrency and Transactions
  • Configuration Management
  • Coupling and Cohesion
  • Data Access
  • Exception Management
  • Layering
  • Logging and Instrumentation
  • State Management
  • Validation
  • Workflow

Scenarios

Category Key Decisions
Authentication and Authorization Inspect for course grained or fine grained authorization
Inspect for appropriate authentication technology
Inspect for appropriate authorization technology
Inspect for resource vs. role based authorization
Inspect for appropriate use of impersonation
Inspect for appropriate use of delegation
Caching Inspect caching in the data access layer
Inspect caching in the business layer
Inspect caching in the services layer
Inspect caching in the presentation layer
Consider hardware constraints that affect caching
Consider performance requirements that affect caching
Communication Inspect for communication styles
Inspect for appropriate choice of communication technology
Inspect for appropriate use of security
Inspect for performance of communication style
Consider hardware constraints that affect communication
Concurrency and Transactions Inspect for concurrency handling
Inspect for transaction failure handling
Inspect for appropriate rollback
Configuration Management Inspect for configuration file management
Inspect for administrative interfaces
Inspect for security of sensitive data in configuration files
Inspect for security of administrative interfaces
Inspect for appropriate separation of configuration functionality between file and code
Coupling and Cohesion Inspect for inappropriate logical dependencies
Inspect for separation of concerns
Data Access Inspect for domain model vs. data-driven model
Inspect entity design
Consider data storage requirements
Exception Management Inspect exception handling
Inspect exception recovery
Inspect exception prevention
Inspect custom exceptions
Layering Inspect separation of logical layers
Inspect data passed between layers
Consider deployment infrastructure
Logging and Instrumentation Inspect choice of logging technology
Inspect for error logging
Inspect for user management logging
Inspect for business operation logging
Inspect for sensitive data handling
Inspect instrumentation strategy
Inspect for log file protection
State Management Inspect state saved in the presentation layer
Inspect state saved in the business layer
Inspect state saved in the services layer
Inspect state saved in the data access layer
Inspect state management technology choice
Inspect security of state management
Inspect performance of state management
Validation Inspect client-side validation
Inspect server-side validation
Inspect validation in the services layer
Inspect validation in the data access layer
Inspect validation in the business layer
Inspect user credentials validation
Workflow Inspect workflow technology choice
Inspect business workflow components

Last edited Jan 30, 2009 at 10:04 PM by prashantbansode, version 1

Comments

No comments yet.