Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...

Descripción completa

Detalles Bibliográficos
Otros Autores: Seifermann, Stephan, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Karlsruhe : KIT Scientific Publishing 2022.
Colección:The Karlsruhe series on software design and quality
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009808935806719
Descripción
Sumario:Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Descripción Física:1 online resource (xiv, 282 pages)