architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...
Γλώσσα: | English |
---|---|
Έκδοση: |
KIT Scientific Publishing
2022
|
Διαθέσιμο Online: | https://doi.org/10.5445/KSP/1000151563 |
Παρόμοια τεκμήρια
-
Statistical Confidentiality Principles and Practice /
ανά: Duncan, George T., κ.ά.
Έκδοση: (2011) -
The Journal of Privacy and Confidentiality
Έκδοση: (2020) -
Confidentiality and Integrity in Crowdsourcing Systems
ανά: Ranj Bar, Amin, κ.ά.
Έκδοση: (2014) -
Marilyn Monroe confidential an intimate personal account
ανά: Pepitone, Lena
Έκδοση: (1979) -
CP violation
ανά: Branco, Gustavo Castelo
Έκδοση: (1999)