Towards a research agenda for understanding and managing uncertainty in self-adaptive systems
Despite considerable research efforts on handling uncertainty in self-adaptive systems, a
comprehensive understanding of the precise nature of uncertainty is still lacking. This paper …
comprehensive understanding of the precise nature of uncertainty is still lacking. This paper …
[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …
reputation are potential consequences of not maintaining confidentiality, which is an …
Architecture-based uncertainty impact analysis to ensure confidentiality
Today's software systems are neither built nor operated in isolation and have to adapt to
their environment. Uncertainty in the software and its context is inherently unavoidable and …
their environment. Uncertainty in the software and its context is inherently unavoidable and …
[PDF][PDF] A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.
Software architectures allow identifying confidentiality issues early and in a cost-efficient
way. Information Flow (IF) and Access Control (AC) are established confidentiality …
way. Information Flow (IF) and Access Control (AC) are established confidentiality …
Model-based confidentiality analysis under uncertainty
In our connected world, ensuring the confidentiality of the software systems we build
becomes increasingly difficult. Model-based design time confidentiality analyses have been …
becomes increasingly difficult. Model-based design time confidentiality analyses have been …
Architectural optimization for confidentiality under structural uncertainty
More and more connected systems gather and exchange data. This allows building smarter,
more efficient and overall better systems. However, the exchange of data also leads to …
more efficient and overall better systems. However, the exchange of data also leads to …
An extensible framework for architecture-based data flow analysis for information security
The growing interconnection between software systems increases the need for security
already at design time. Security-related properties like confidentiality are often analyzed …
already at design time. Security-related properties like confidentiality are often analyzed …
A model-based framework for simplified collaboration of legal and software experts in data protection assessments
The protection of personal data has become an increasingly important issue. Legal norms
focused on data protection, such as the EU General Data Protection Regulation (GDPR) …
focused on data protection, such as the EU General Data Protection Regulation (GDPR) …
Architectural access control policy refinement and verification under uncertainty
S Hahner - … of the 15th European Conference on …, 2021 - publikationen.bibliothek.kit.edu
In our connected world, confidentiality is a central quality requirement. A commonly used
mechanism to meet confidentiality requirements is access control. However, access control …
mechanism to meet confidentiality requirements is access control. However, access control …
A classification of software-architectural uncertainty regarding confidentiality
In our connected world, ensuring and demonstrating the confidentiality of exchanged data
becomes increasingly critical for software systems. However, especially in early system …
becomes increasingly critical for software systems. However, especially in early system …