Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / / Stephan Seifermann.

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Karlsruhe : : KIT Scientific Publishing,, 2022.
Year of Publication:2022
Language:English
Series:The Karlsruhe series on software design and quality
Physical Description:1 online resource (xiv, 282 pages).
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01550nam a2200289 i 4500
001 993660573704498
005 20230329192457.0
006 m o d
007 cr |||||||||||
008 230329s2022 gw o 000 0 eng d
035 |a (CKB)5850000000308291 
035 |a (NjHacI)995850000000308291 
035 |a (EXLCZ)995850000000308291 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
050 4 |a K2280  |b .S454 2022 
082 0 4 |a 342.0858  |2 23 
100 1 |a Seifermann, Stephan,  |e author. 
245 1 0 |a Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements /  |c Stephan Seifermann. 
264 1 |a Karlsruhe :  |b KIT Scientific Publishing,  |c 2022. 
300 |a 1 online resource (xiv, 282 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a The Karlsruhe series on software design and quality 
588 |a Description based on online resource; title from PDF title page (KIT Scientific Publishing, viewed March 29, 2023). 
520 |a Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes. 
650 0 |a Confidential communications. 
776 |z 1000151563 
906 |a BOOK 
ADM |b 2024-04-16 05:00:30 Europe/Vienna  |f System  |c marc21  |a 2022-12-05 16:10:45 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5354212540004498&Force_direct=true  |Z 5354212540004498  |b Available  |8 5354212540004498