Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
Abstract
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Keywords
Vertraulichkeit; Zugriffskontrolle; Informationsflusskontrolle; Datenflüsse; Softwarearchitektur; confidentiality; access control; information flow control; data flows; software architectureDOI
10.5445/KSP/1000151563ISBN
9783731512462Publisher
KIT Scientific PublishingPublisher website
https://www.ksp.kit.edu/index.php?link=shop&sort=allPublication date and place
2022Series
The Karlsruhe Series on Software Design and Quality, 36Classification
Maths for computer scientists