Feedback

X
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

0 Ungluers have Faved this Work
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 35 times via unglue.it ebook links.
  1. 35 - pdf (CC BY-SA) at OAPEN Library.

Keywords

  • Access control
  • Computer science
  • Computing & information technology
  • confidentiality
  • Data Flows
  • Datenflüsse
  • information flow control
  • Informationsflusskontrolle
  • Mathematical theory of computation
  • Maths for computer scientists
  • Software architecture
  • Softwarearchitektur
  • thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists
  • Vertraulichkeit
  • Zugriffskontrolle

Links

DOI: 10.5445/KSP/1000151563

Editions

edition cover

Share

Copy/paste this into your site: