• Part of
    Ubiquity Network logo
    Interesse beim KIT-Verlag zu publizieren? Informationen für Autorinnen und Autoren

    Online lesen
  • No readable formats available
  • Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

    Stephan Seifermann

    Band 36 von The Karlsruhe Series on Software Design and Quality
     Download

    Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.

    Umfang: XIII, 382 S.

    Preis: 49.00 €

    Wikipedia Concepts

    These are words or phrases in the text that have been automatically identified by the Named Entity Recognition and Disambiguation service, which provides Wikipedia () and Wikidata () links for these entities.

    Metrics:

    Konversationen


    Empfohlene Zitierweise
    Seifermann, S. 2022. Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements. Karlsruhe: KIT Scientific Publishing. DOI: https://doi.org/10.5445/KSP/1000151563
    Seifermann, S., 2022. Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements. Karlsruhe: KIT Scientific Publishing. DOI: https://doi.org/10.5445/KSP/1000151563
    Seifermann, S. Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements. KIT Scientific Publishing, 2022. DOI: https://doi.org/10.5445/KSP/1000151563
    Seifermann, S. (2022). Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements. Karlsruhe: KIT Scientific Publishing. DOI: https://doi.org/10.5445/KSP/1000151563
    Seifermann, Stephan. 2022. Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements. Karlsruhe: KIT Scientific Publishing. DOI: https://doi.org/10.5445/KSP/1000151563




    Export to:




    Lizenz

    Dieses Buch ist lizenziert unter Creative Commons Attribution + ShareAlike 4.0

    Peer Review Informationen

    Dieses Buch ist Peer reviewed. Informationen dazu finden Sie hier

    Weitere Informationen

    Veröffentlicht am 9. Dezember 2022

    Sprache

    Englisch

    Seitenanzahl:

    414

    ISBN
    Paperback 978-3-7315-1246-2

    DOI
    https://doi.org/10.5445/KSP/1000151563