Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...

Full description

Bibliographic Details
Main Author: Seifermann, Stephan
Format: eBook
Language:English
Published: KIT Scientific Publishing 2022
Series:The Karlsruhe Series on Software Design and Quality
Subjects:
Online Access:
Collection: Directory of Open Access Books - Collection details see MPG.ReNa
Description
Summary:Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Item Description:Creative Commons (cc), https://creativecommons.org/licenses/by-sa/4.0/
Physical Description:1 electronic resource (412 p.)
ISBN:1000151563