Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / / Stephan Seifermann.
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Karlsruhe : : KIT Scientific Publishing,, 2022. |
Year of Publication: | 2022 |
Language: | English |
Series: | The Karlsruhe series on software design and quality
|
Physical Description: | 1 online resource (xiv, 282 pages). |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993573486504498 |
---|---|
ctrlnum |
(CKB)5850000000308291 (NjHacI)995850000000308291 (EXLCZ)995850000000308291 |
collection |
bib_alma |
record_format |
marc |
spelling |
Seifermann, Stephan, author. Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / Stephan Seifermann. Karlsruhe : KIT Scientific Publishing, 2022. 1 online resource (xiv, 282 pages). text txt rdacontent computer c rdamedia online resource cr rdacarrier The Karlsruhe series on software design and quality Description based on online resource; title from PDF title page (KIT Scientific Publishing, viewed March 29, 2023). Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes. Confidential communications. 1000151563 |
language |
English |
format |
eBook |
author |
Seifermann, Stephan, |
spellingShingle |
Seifermann, Stephan, Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / The Karlsruhe series on software design and quality |
author_facet |
Seifermann, Stephan, |
author_variant |
s s ss |
author_role |
VerfasserIn |
author_sort |
Seifermann, Stephan, |
title |
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / |
title_full |
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / Stephan Seifermann. |
title_fullStr |
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / Stephan Seifermann. |
title_full_unstemmed |
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / Stephan Seifermann. |
title_auth |
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / |
title_new |
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / |
title_sort |
architectural data flow analysis for detecting violations of confidentiality requirements / |
series |
The Karlsruhe series on software design and quality |
series2 |
The Karlsruhe series on software design and quality |
publisher |
KIT Scientific Publishing, |
publishDate |
2022 |
physical |
1 online resource (xiv, 282 pages). |
isbn |
1000151563 |
callnumber-first |
K - Law |
callnumber-subject |
K - General Law |
callnumber-label |
K2280 |
callnumber-sort |
K 42280 S454 42022 |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
340 - Law |
dewey-ones |
342 - Constitutional & administrative law |
dewey-full |
342.0858 |
dewey-sort |
3342.0858 |
dewey-raw |
342.0858 |
dewey-search |
342.0858 |
work_keys_str_mv |
AT seifermannstephan architecturaldataflowanalysisfordetectingviolationsofconfidentialityrequirements |
status_str |
n |
ids_txt_mv |
(CKB)5850000000308291 (NjHacI)995850000000308291 (EXLCZ)995850000000308291 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / |
_version_ |
1787552979517177856 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01550nam a2200289 i 4500</leader><controlfield tag="001">993573486504498</controlfield><controlfield tag="005">20230329192457.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230329s2022 gw o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5850000000308291</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995850000000308291</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995850000000308291</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">K2280</subfield><subfield code="b">.S454 2022</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">342.0858</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Seifermann, Stephan,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements /</subfield><subfield code="c">Stephan Seifermann.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Karlsruhe :</subfield><subfield code="b">KIT Scientific Publishing,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 282 pages).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Karlsruhe series on software design and quality</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (KIT Scientific Publishing, viewed March 29, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential communications.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1000151563</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-04-15 12:18:20 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-12-05 16:10:45 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5341805380004498&Force_direct=true</subfield><subfield code="Z">5341805380004498</subfield><subfield code="b">Available</subfield><subfield code="8">5341805380004498</subfield></datafield></record></collection> |