Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / / Stephan Seifermann.
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Karlsruhe : : KIT Scientific Publishing,, 2022. |
Year of Publication: | 2022 |
Language: | English |
Series: | The Karlsruhe series on software design and quality
|
Physical Description: | 1 online resource (xiv, 282 pages). |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / / Stephan Seifermann.
by: Seifermann, Stephan,
Published: (2022.) - Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
-
Assuring the Confidentiality of Social Research Data / / Robert F. Boruch, Joe S. Cecil.
by: Boruch, Robert F.,
Published: ([2016]) -
Confidentiality and mental health / edited by Christopher Cordess.
Published: (2001.) -
The journal of privacy and confidentiality.
Published: (©2009-)