01641nam 2200349 450 991063406250332120230329192457.0(CKB)5850000000308291(NjHacI)995850000000308291(EXLCZ)99585000000030829120230329d2022 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierArchitectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements /Stephan SeifermannKarlsruhe :KIT Scientific Publishing,2022.1 online resource (xiv, 282 pages)The Karlsruhe series on software design and quality1000151563 Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.Confidential communicationsConfidential communications.342.0858Seifermann Stephan1346543NjHacINjHaclBOOK9910634062503321Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements3075889UNINA