Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...

Full description

Bibliographic Details
Main Author: Seifermann, Stephan
Format: eBook
Language:English
Published: KIT Scientific Publishing 2022
Series:The Karlsruhe Series on Software Design and Quality
Subjects:
Online Access:
Collection: Directory of Open Access Books - Collection details see MPG.ReNa
LEADER 02089nma a2200325 u 4500
001 EB002142930
003 EBX01000000000000001281056
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230202 ||| eng
020 |a 1000151563 
100 1 |a Seifermann, Stephan 
245 0 0 |a Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements  |h Elektronische Ressource 
260 |b KIT Scientific Publishing  |c 2022 
300 |a 1 electronic resource (412 p.) 
653 |a Maths for computer scientists / bicssc 
653 |a Vertraulichkeit; Zugriffskontrolle; Informationsflusskontrolle; Datenflüsse; Softwarearchitektur; confidentiality; access control; information flow control; data flows; software architecture 
653 |a thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists 
041 0 7 |a eng  |2 ISO 639-2 
989 |b DOAB  |a Directory of Open Access Books 
490 0 |a The Karlsruhe Series on Software Design and Quality 
500 |a Creative Commons (cc), https://creativecommons.org/licenses/by-sa/4.0/ 
028 5 0 |a 10.5445/KSP/1000151563 
856 4 2 |u https://directory.doabooks.org/handle/20.500.12854/95458  |z DOAB: description of the publication 
856 4 0 |u https://library.oapen.org/bitstream/20.500.12657/60291/1/architectural-data-flow-analysis-for-detecting-violations-of-confidentiality-requirements.pdf  |7 0  |x Verlag  |3 Volltext 
082 0 |a 720 
082 0 |a 500 
082 0 |a 000 
082 0 |a 600 
520 |a Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.