architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Γλώσσα:English
Έκδοση: KIT Scientific Publishing 2022
Διαθέσιμο Online:https://doi.org/10.5445/KSP/1000151563
id oapen-20.500.12657-60291
record_format dspace
spelling oapen-20.500.12657-602912024-03-27T14:14:55Z Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements Seifermann, Stephan Vertraulichkeit; Zugriffskontrolle; Informationsflusskontrolle; Datenflüsse; Softwarearchitektur; confidentiality; access control; information flow control; data flows; software architecture thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes. 2022-12-19T11:12:49Z 2022-12-19T11:12:49Z 2022 book https://library.oapen.org/handle/20.500.12657/60291 eng The Karlsruhe Series on Software Design and Quality application/pdf Attribution-ShareAlike 4.0 International architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf https://doi.org/10.5445/KSP/1000151563 KIT Scientific Publishing 10.5445/KSP/1000151563 10.5445/KSP/1000151563 44e29711-8d53-496b-85cc-3d10c9469be9 36 412 open access
institution OAPEN
collection DSpace
language English
description Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
title architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
spellingShingle architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
title_short architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
title_full architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
title_fullStr architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
title_full_unstemmed architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
title_sort architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
publisher KIT Scientific Publishing
publishDate 2022
url https://doi.org/10.5445/KSP/1000151563
_version_ 1799945209427001344