Local cover image
Local cover image

Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

By: Material type: ArticleArticleLanguage: English Series: The Karlsruhe Series on Software Design and Quality ; v.36Publication details: KIT Scientific Publishing 2022Description: 1 electronic resource (412 p.)Subject(s): Online resources: Summary: Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Shelving location Call number Vol info Status Notes Date due Barcode
Electronic edition Bucheon University Library Computers OAPEN 004.45 T44 v.36 v.36 Not for loan Смотреть (pdf) 1010567

Open Access star Unrestricted online access

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.

Creative Commons https://creativecommons.org/licenses/by-sa/4.0/ cc

English

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image