id |
oapen-20.500.12657-60291
|
record_format |
dspace
|
spelling |
oapen-20.500.12657-602912024-03-27T14:14:55Z Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements Seifermann, Stephan Vertraulichkeit; Zugriffskontrolle; Informationsflusskontrolle; Datenflüsse; Softwarearchitektur; confidentiality; access control; information flow control; data flows; software architecture thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes. 2022-12-19T11:12:49Z 2022-12-19T11:12:49Z 2022 book https://library.oapen.org/handle/20.500.12657/60291 eng The Karlsruhe Series on Software Design and Quality application/pdf Attribution-ShareAlike 4.0 International architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf https://doi.org/10.5445/KSP/1000151563 KIT Scientific Publishing 10.5445/KSP/1000151563 10.5445/KSP/1000151563 44e29711-8d53-496b-85cc-3d10c9469be9 36 412 open access
|
institution |
OAPEN
|
collection |
DSpace
|
language |
English
|
description |
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
|
title |
architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
|
spellingShingle |
architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
|
title_short |
architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
|
title_full |
architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
|
title_fullStr |
architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
|
title_full_unstemmed |
architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
|
title_sort |
architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
|
publisher |
KIT Scientific Publishing
|
publishDate |
2022
|
url |
https://doi.org/10.5445/KSP/1000151563
|
_version_ |
1799945209427001344
|