Lightweight software architecture evaluation for industry: A comprehensive review
Processes for evaluating software architecture (SA) help to investigate problems and
potential risks in SA. It is derived from many studies that proposed a plethora of systematic …
potential risks in SA. It is derived from many studies that proposed a plethora of systematic …
[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …
reputation are potential consequences of not maintaining confidentiality, which is an …
Automating the early detection of security design flaws
Security by design is a key principle for realizing secure software systems and it is advised
to hunt for security flaws from the very early stages of development. At design-time, security …
to hunt for security flaws from the very early stages of development. At design-time, security …
Architectural attack propagation analysis for identifying confidentiality issues
Exchanging data between different systems enables us to build new smart services and
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …
Modeling data flow constraints for design-time confidentiality analyses
With the increase in connectedness and the growing volume of data, ensuring confidentiality
becomes increasingly critical. Data-driven analyses try to cope with this complexity by …
becomes increasingly critical. Data-driven analyses try to cope with this complexity by …
Architecture-based uncertainty impact analysis to ensure confidentiality
Today's software systems are neither built nor operated in isolation and have to adapt to
their environment. Uncertainty in the software and its context is inherently unavoidable and …
their environment. Uncertainty in the software and its context is inherently unavoidable and …
A data-flow oriented software architecture for heterogeneous marine data streams
Marine in-situ data is collected by sensors mounted on fixed or mobile systems deployed
into the ocean. This type of data is crucial both for the ocean industries and public …
into the ocean. This type of data is crucial both for the ocean industries and public …
[PDF][PDF] A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.
Software architectures allow identifying confidentiality issues early and in a cost-efficient
way. Information Flow (IF) and Access Control (AC) are established confidentiality …
way. Information Flow (IF) and Access Control (AC) are established confidentiality …
Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0
Exchanging data between entities is an essential part of Industry 4.0. However, the data
exchange should not affect the confidentiality. Therefore, data should only be shared with …
exchange should not affect the confidentiality. Therefore, data should only be shared with …
An extensible framework for architecture-based data flow analysis for information security
The growing interconnection between software systems increases the need for security
already at design time. Security-related properties like confidentiality are often analyzed …
already at design time. Security-related properties like confidentiality are often analyzed …