Lightweight software architecture evaluation for industry: A comprehensive review

M Sahlabadi, RC Muniyandi, Z Shukur, F Qamar - Sensors, 2022 - mdpi.com
Processes for evaluating software architecture (SA) help to investigate problems and
potential risks in SA. It is derived from many studies that proposed a plethora of systematic …

[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams

S Seifermann, R Heinrich, D Werle… - Journal of Systems and …, 2022 - Elsevier
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …

Automating the early detection of security design flaws

K Tuma, L Sion, R Scandariato, K Yskout - Proceedings of the 23rd ACM …, 2020 - dl.acm.org
Security by design is a key principle for realizing secure software systems and it is advised
to hunt for security flaws from the very early stages of development. At design-time, security …

Architectural attack propagation analysis for identifying confidentiality issues

M Walter, R Heinrich… - 2022 IEEE 19th …, 2022 - ieeexplore.ieee.org
Exchanging data between different systems enables us to build new smart services and
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …

Modeling data flow constraints for design-time confidentiality analyses

S Hahner, S Seifermann, R Heinrich… - 2021 IEEE 18th …, 2021 - ieeexplore.ieee.org
With the increase in connectedness and the growing volume of data, ensuring confidentiality
becomes increasingly critical. Data-driven analyses try to cope with this complexity by …

Architecture-based uncertainty impact analysis to ensure confidentiality

S Hahner, R Heinrich… - 2023 IEEE/ACM 18th …, 2023 - ieeexplore.ieee.org
Today's software systems are neither built nor operated in isolation and have to adapt to
their environment. Uncertainty in the software and its context is inherently unavoidable and …

A data-flow oriented software architecture for heterogeneous marine data streams

K Lima, NT Nguyen, R Heldal… - 2024 IEEE 21st …, 2024 - ieeexplore.ieee.org
Marine in-situ data is collected by sensors mounted on fixed or mobile systems deployed
into the ocean. This type of data is crucial both for the ocean industries and public …

[PDF][PDF] A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.

S Seifermann, R Heinrich, D Werle, RH Reussner - SECRYPT, 2021 - scitepress.org
Software architectures allow identifying confidentiality issues early and in a cost-efficient
way. Information Flow (IF) and Access Control (AC) are established confidentiality …

Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0

M Walter, S Hahner, T Bureš, P Hnětynka… - at …, 2023 - degruyter.com
Exchanging data between entities is an essential part of Industry 4.0. However, the data
exchange should not affect the confidentiality. Therefore, data should only be shared with …

An extensible framework for architecture-based data flow analysis for information security

N Boltz, S Hahner, C Gerking, R Heinrich - European Conference on …, 2023 - Springer
The growing interconnection between software systems increases the need for security
already at design time. Security-related properties like confidentiality are often analyzed …