Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
Material type: ArticleLanguage: English Series: The Karlsruhe Series on Software Design and Quality ; v.36Publication details: KIT Scientific Publishing 2022Description: 1 electronic resource (412 p.)Subject(s): Online resources: Summary: Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.Item type | Current library | Collection | Shelving location | Call number | Vol info | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
Electronic edition | Bucheon University Library | Computers | OAPEN | 004.45 T44 v.36 | v.36 | Not for loan | Смотреть (pdf) | 1010567 |
Open Access star Unrestricted online access
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Creative Commons https://creativecommons.org/licenses/by-sa/4.0/ cc
English
There are no comments on this title.