Show simple item record

dc.contributor.authorSeifermann, Stephan
dc.date.accessioned2022-12-19T11:12:49Z
dc.date.available2022-12-19T11:12:49Z
dc.date.issued2022
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/60291
dc.description.abstractSoftware vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.en_US
dc.languageEnglishen_US
dc.relation.ispartofseriesThe Karlsruhe Series on Software Design and Qualityen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientistsen_US
dc.subject.otherVertraulichkeit; Zugriffskontrolle; Informationsflusskontrolle; Datenflüsse; Softwarearchitektur; confidentiality; access control; information flow control; data flows; software architectureen_US
dc.titleArchitectural Data Flow Analysis for Detecting Violations of Confidentiality Requirementsen_US
dc.typebook
oapen.identifier.doi10.5445/KSP/1000151563en_US
oapen.relation.isPublishedBy44e29711-8d53-496b-85cc-3d10c9469be9en_US
oapen.series.number36en_US
oapen.pages412en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record