Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...

Full description

Saved in:
Bibliographic Details
Main Author: Seifermann, Stephan (auth)
Format: Electronic Book Chapter
Language:English
Published: KIT Scientific Publishing 2022
Series:The Karlsruhe Series on Software Design and Quality 36
Subjects:
Online Access:OAPEN Library: download the publication
OAPEN Library: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 oapen_2024_20_500_12657_60291
005 20221219
003 oapen
006 m o d
007 cr|mn|---annan
008 20221219s2022 xx |||||o ||| 0|eng d
020 |a KSP/1000151563 
040 |a oapen  |c oapen 
024 7 |a 10.5445/KSP/1000151563  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UYAM  |2 bicssc 
100 1 |a Seifermann, Stephan  |4 auth 
245 1 0 |a Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements 
260 |b KIT Scientific Publishing  |c 2022 
300 |a 1 electronic resource (412 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a The Karlsruhe Series on Software Design and Quality  |v 36 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-sa/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-sa/4.0/ 
546 |a English 
650 7 |a Maths for computer scientists  |2 bicssc 
653 |a Vertraulichkeit; Zugriffskontrolle; Informationsflusskontrolle; Datenflüsse; Softwarearchitektur; confidentiality; access control; information flow control; data flows; software architecture 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/id/97449ee6-4f92-49fd-8315-c0342c9de6fa/architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf  |7 0  |z OAPEN Library: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/handle/20.500.12657/60291  |7 0  |z OAPEN Library: description of the publication