Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
KIT Scientific Publishing
2022
|
Series: | The Karlsruhe Series on Software Design and Quality
36 |
Subjects: | |
Online Access: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | oapen_2024_20_500_12657_60291 | ||
005 | 20221219 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20221219s2022 xx |||||o ||| 0|eng d | ||
020 | |a KSP/1000151563 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5445/KSP/1000151563 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UYAM |2 bicssc | |
100 | 1 | |a Seifermann, Stephan |4 auth | |
245 | 1 | 0 | |a Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements |
260 | |b KIT Scientific Publishing |c 2022 | ||
300 | |a 1 electronic resource (412 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a The Karlsruhe Series on Software Design and Quality |v 36 | |
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-sa/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-sa/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Maths for computer scientists |2 bicssc | |
653 | |a Vertraulichkeit; Zugriffskontrolle; Informationsflusskontrolle; Datenflüsse; Softwarearchitektur; confidentiality; access control; information flow control; data flows; software architecture | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/id/97449ee6-4f92-49fd-8315-c0342c9de6fa/architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf |7 0 |z OAPEN Library: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/handle/20.500.12657/60291 |7 0 |z OAPEN Library: description of the publication |