Concept for Privacy Compliance Restoring Reconfigurations

Summary
This report will document the RestAssured approach for deriving adaptations plans based on runtime models and violation traces. The concept will include the utilization for privacy violation traces that will dissolve detected privacy violation root causes, and it reports on the prototype for generating and executing a reconfiguration plan for the cloud application.