LEADER 01641nam 2200349 450 001 9910634062503321 005 20230329192457.0 035 $a(CKB)5850000000308291 035 $a(NjHacI)995850000000308291 035 $a(EXLCZ)995850000000308291 100 $a20230329d2022 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aArchitectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements /$fStephan Seifermann 210 1$aKarlsruhe :$cKIT Scientific Publishing,$d2022. 215 $a1 online resource (xiv, 282 pages) 225 0 $aThe Karlsruhe series on software design and quality 311 $a1000151563 330 $aSoftware vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes. 606 $aConfidential communications 615 0$aConfidential communications. 676 $a342.0858 700 $aSeifermann$b Stephan$01346543 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910634062503321 996 $aArchitectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements$93075889 997 $aUNINA