Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...

Olles dieđut

Furkejuvvon:
Bibliográfalaš dieđut
Váldodahkki: Seifermann, Stephan (auth)
Materiálatiipa: Elektrovnnalaš Girjji oassi
Giella:eaŋgalasgiella
Almmustuhtton: KIT Scientific Publishing 2022
Ráidu:The Karlsruhe Series on Software Design and Quality 36
Fáttát:
Liŋkkat:OAPEN Library: download the publication
OAPEN Library: description of the publication
Fáddágilkorat: Lasit fáddágilkoriid
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!

Geahča maid