Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / / Stephan Seifermann.

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitat...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Karlsruhe : : KIT Scientific Publishing,, 2022.
Year of Publication:2022
Language:English
Series:The Karlsruhe series on software design and quality
Physical Description:1 online resource (xiv, 282 pages).
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993660573704498
ctrlnum (CKB)5850000000308291
(NjHacI)995850000000308291
(EXLCZ)995850000000308291
collection bib_alma
record_format marc
spelling Seifermann, Stephan, author.
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / Stephan Seifermann.
Karlsruhe : KIT Scientific Publishing, 2022.
1 online resource (xiv, 282 pages).
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
The Karlsruhe series on software design and quality
Description based on online resource; title from PDF title page (KIT Scientific Publishing, viewed March 29, 2023).
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Confidential communications.
1000151563
language English
format eBook
author Seifermann, Stephan,
spellingShingle Seifermann, Stephan,
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements /
The Karlsruhe series on software design and quality
author_facet Seifermann, Stephan,
author_variant s s ss
author_role VerfasserIn
author_sort Seifermann, Stephan,
title Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements /
title_full Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / Stephan Seifermann.
title_fullStr Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / Stephan Seifermann.
title_full_unstemmed Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements / Stephan Seifermann.
title_auth Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements /
title_new Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements /
title_sort architectural data flow analysis for detecting violations of confidentiality requirements /
series The Karlsruhe series on software design and quality
series2 The Karlsruhe series on software design and quality
publisher KIT Scientific Publishing,
publishDate 2022
physical 1 online resource (xiv, 282 pages).
isbn 1000151563
callnumber-first K - Law
callnumber-subject K - General Law
callnumber-label K2280
callnumber-sort K 42280 S454 42022
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 340 - Law
dewey-ones 342 - Constitutional & administrative law
dewey-full 342.0858
dewey-sort 3342.0858
dewey-raw 342.0858
dewey-search 342.0858
work_keys_str_mv AT seifermannstephan architecturaldataflowanalysisfordetectingviolationsofconfidentialityrequirements
status_str n
ids_txt_mv (CKB)5850000000308291
(NjHacI)995850000000308291
(EXLCZ)995850000000308291
carrierType_str_mv cr
is_hierarchy_title Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements /
_version_ 1796653810932776961
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01550nam a2200289 i 4500</leader><controlfield tag="001">993660573704498</controlfield><controlfield tag="005">20230329192457.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230329s2022 gw o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5850000000308291</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995850000000308291</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995850000000308291</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">K2280</subfield><subfield code="b">.S454 2022</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">342.0858</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Seifermann, Stephan,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements /</subfield><subfield code="c">Stephan Seifermann.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Karlsruhe :</subfield><subfield code="b">KIT Scientific Publishing,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 282 pages).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Karlsruhe series on software design and quality</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (KIT Scientific Publishing, viewed March 29, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential communications.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1000151563</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-04-16 05:00:30 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-12-05 16:10:45 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5354212540004498&amp;Force_direct=true</subfield><subfield code="Z">5354212540004498</subfield><subfield code="b">Available</subfield><subfield code="8">5354212540004498</subfield></datafield></record></collection>