Towards a research agenda for understanding and managing uncertainty in self-adaptive systems

D Weyns, R Calinescu, R Mirandola, K Tei… - ACM SIGSOFT …, 2023 - dl.acm.org
Despite considerable research efforts on handling uncertainty in self-adaptive systems, a
comprehensive understanding of the precise nature of uncertainty is still lacking. This paper …

[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams

S Seifermann, R Heinrich, D Werle… - Journal of Systems and …, 2022 - Elsevier
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …

Architecture-based uncertainty impact analysis to ensure confidentiality

S Hahner, R Heinrich… - 2023 IEEE/ACM 18th …, 2023 - ieeexplore.ieee.org
Today's software systems are neither built nor operated in isolation and have to adapt to
their environment. Uncertainty in the software and its context is inherently unavoidable and …

[PDF][PDF] A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.

S Seifermann, R Heinrich, D Werle, RH Reussner - SECRYPT, 2021 - scitepress.org
Software architectures allow identifying confidentiality issues early and in a cost-efficient
way. Information Flow (IF) and Access Control (AC) are established confidentiality …

Model-based confidentiality analysis under uncertainty

S Hahner, T Bitschi, M Walter, T Bureš… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
In our connected world, ensuring the confidentiality of the software systems we build
becomes increasingly difficult. Model-based design time confidentiality analyses have been …

Architectural optimization for confidentiality under structural uncertainty

M Walter, S Hahner, S Seifermann, T Bures… - … Conference on Software …, 2021 - Springer
More and more connected systems gather and exchange data. This allows building smarter,
more efficient and overall better systems. However, the exchange of data also leads to …

An extensible framework for architecture-based data flow analysis for information security

N Boltz, S Hahner, C Gerking, R Heinrich - European Conference on …, 2023 - Springer
The growing interconnection between software systems increases the need for security
already at design time. Security-related properties like confidentiality are often analyzed …

A model-based framework for simplified collaboration of legal and software experts in data protection assessments

N Boltz, L Sterz, C Gerking, O Raabe - 2022 - dl.gi.de
The protection of personal data has become an increasingly important issue. Legal norms
focused on data protection, such as the EU General Data Protection Regulation (GDPR) …

Architectural access control policy refinement and verification under uncertainty

S Hahner - … of the 15th European Conference on …, 2021 - publikationen.bibliothek.kit.edu
In our connected world, confidentiality is a central quality requirement. A commonly used
mechanism to meet confidentiality requirements is access control. However, access control …

A classification of software-architectural uncertainty regarding confidentiality

S Hahner, S Seifermann, R Heinrich… - … Conference on E …, 2021 - Springer
In our connected world, ensuring and demonstrating the confidentiality of exchanged data
becomes increasingly critical for software systems. However, especially in early system …