Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...
Furkejuvvon:
Váldodahkki: | Seifermann, Stephan (auth) |
---|---|
Materiálatiipa: | Elektrovnnalaš Girjji oassi |
Giella: | eaŋgalasgiella |
Almmustuhtton: |
KIT Scientific Publishing
2022
|
Ráidu: | The Karlsruhe Series on Software Design and Quality
36 |
Fáttát: | |
Liŋkkat: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Fáddágilkorat: |
Lasit fáddágilkoriid
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|
Geahča maid
-
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
Dahkki: Seifermann, Stephan
Almmustuhtton: (2022) -
Architectural Alignment of Access Control Requirements Extracted from Business Processes
Dahkki: Pilipchuk, Roman
Almmustuhtton: (2023) -
Architectural Alignment of Access Control Requirements Extracted from Business Processes
Dahkki: Pilipchuk, Roman
Almmustuhtton: (2023) -
Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security
Dahkki: Mohr, Martin
Almmustuhtton: (2023) -
Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security
Dahkki: Mohr, Martin
Almmustuhtton: (2023)