Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...
Сохранить в:
Главный автор: | |
---|---|
Формат: | Электронный ресурс Глава книги |
Язык: | английский |
Опубликовано: |
KIT Scientific Publishing
2022
|
Серии: | The Karlsruhe Series on Software Design and Quality
36 |
Предметы: | |
Online-ссылка: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
Итог: | Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes. |
---|---|
Объем: | 1 electronic resource (412 p.) |
ISBN: | KSP/1000151563 |
Доступ: | Open Access |