IRI: https://meta.linked.archi/tactics#AvailabilityTactic
IRI: https://meta.linked.archi/tactics#ControlResourceDemand
Techniques: Manage Sampling Rate, Limit Event Response, Prioritize Events, Reduce Overhead, Bound Execution Times, Increase Resource Efficiency.
IRI: https://meta.linked.archi/tactics#DeferBinding
Techniques: Component Replacement, Compile-Time Parameterization, Configuration-Time Binding, Runtime Registration, Dynamic Lookup, Interpret Parameters, Startup-Time Binding, Name Servers, Plug-ins, Publish-Subscribe, Shared Repositories, Polymorphism.
IRI: https://meta.linked.archi/tactics#DetectAttacks
Techniques: Detect Intrusion, Detect Service Denial, Verify Message Integrity, Detect Message Delay.
IRI: https://meta.linked.archi/tactics#DetectFaults
Techniques: Ping/Echo, Heartbeat, Timestamp, Sanity Checking, Condition Monitoring, Voting, Exception Detection, Self-Test.
IRI: https://meta.linked.archi/tactics#IncreaseCohesion
IRI: https://meta.linked.archi/tactics#InteroperabilityTactic
IRI: https://meta.linked.archi/tactics#Locate
Techniques: Discover Service, Use Known Interface.
IRI: https://meta.linked.archi/tactics#ManageInterfaces
Techniques: Orchestrate, Tailor Interface.
IRI: https://meta.linked.archi/tactics#ManageResources
Techniques: Increase Resources, Introduce Concurrency, Maintain Multiple Copies of Computations, Maintain Multiple Copies of Data, Bound Queue Sizes, Schedule Resources.
IRI: https://meta.linked.archi/tactics#ModifiabilityTactic
IRI: https://meta.linked.archi/tactics#PerformanceTactic
IRI: https://meta.linked.archi/tactics#PreparationAndRepair
Techniques: Active Redundancy (Hot Spare), Passive Redundancy (Warm Spare), Spare, Exception Handling, Rollback, Software Upgrade, Retry, Ignore Faulty Behavior, Degradation, Reconfiguration.
IRI: https://meta.linked.archi/tactics#PreventFaults
Techniques: Removal from Service, Transactions, Predictive Model, Exception Prevention, Increase Competence Set.
IRI: https://meta.linked.archi/tactics#ReactToAttacks
Techniques: Revoke Access, Lock Computer, Inform Actors.
IRI: https://meta.linked.archi/tactics#RecoverFromAttacks
Techniques: Maintain Audit Trail, Restore (using availability tactics).
IRI: https://meta.linked.archi/tactics#RecoverFromFaults
IRI: https://meta.linked.archi/tactics#ReduceCoupling
Techniques: Encapsulate, Use an Intermediary, Restrict Dependencies, Refactor, Abstract Common Services.
IRI: https://meta.linked.archi/tactics#ReduceSizeOfAModule
Techniques: Split Module, Increase Semantic Coherence.
IRI: https://meta.linked.archi/tactics#Reintroduction
Techniques: Shadow, State Resynchronization, Escalating Restart, Non-Stop Forwarding.
IRI: https://meta.linked.archi/tactics#ResistAttacks
Techniques: Identify Actors, Authenticate Actors, Authorize Actors, Limit Access, Limit Exposure, Encrypt Data, Separate Entities, Change Default Settings.
IRI: https://meta.linked.archi/tactics#SecurityTactic
The authors would like to thank Silvio Peroni for developing LODE, a Live OWL Documentation Environment, which is used for representing the Cross Referencing Section of this document and Daniel Garijo for developing Widoco, the program used to create the template used in this documentation.