[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams

S Seifermann, R Heinrich, D Werle… - Journal of Systems and …, 2022 - Elsevier
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …

Architectural attack propagation analysis for identifying confidentiality issues

M Walter, R Heinrich… - 2022 IEEE 19th …, 2022 - ieeexplore.ieee.org
Exchanging data between different systems enables us to build new smart services and
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …

Architectural optimization for confidentiality under structural uncertainty

M Walter, S Hahner, S Seifermann, T Bures… - … Conference on Software …, 2021 - Springer
More and more connected systems gather and exchange data. This allows building smarter,
more efficient and overall better systems. However, the exchange of data also leads to …

FSECAM: A contextual thematic approach for linking feature to multi-level software architectural components

AK Mondal, M Hossain, CK Roy, B Roy… - Journal of Systems and …, 2025 - Elsevier
Linking software features to code components is commonly performed during software
development and maintenance, including to implement a feature, document code, design …

[BOOK][B] Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

S Seifermann - 2022 - library.oapen.org
Software vendors must consider confidentiality especially while creating software
architectures because decisions made here are hard to change later. Our approach …

A survey of software architectural change detection and categorization techniques

AK Mondal, KA Schneider, B Roy, CK Roy - Journal of Systems and …, 2022 - Elsevier
Software architecture is defined as the structural construction, design decisions
implementation, evolution and knowledge sharing mechanisms of a system. Software …

[HTML][HTML] Reconstruction of an execution architecture view by identifying map** rules for connectors

H Ahn, S Kang, S Lee - Journal of Systems and Software, 2025 - Elsevier
An execution architecture view plays a crucial role in depicting the structure of a software
system at runtime and analyzing its execution aspects, such as concurrency and …

Commit-Based Continuous Integration of Performance Models

M Armbruster - Softwaretechnik-Trends Band 43, Heft 2, 2023 - dl.gi.de
Architecture-level performance models (aPM) such as the Palladio Component Model
(PCM) can be used for, eg, performance predictions to explore design alternatives and …

Quantifying Software Correctness by Combining Architecture Modeling and Formal Program Analysis

F Lanzinger, C Martin, F Reiche, S Teuber… - Proceedings of the 39th …, 2024 - dl.acm.org
Most formal methods see the correctness of a software system as a binary decision.
However, proving the correctness of complex systems completely is difficult because they …

[PDF][PDF] Continuous Integration of Architectural Performance Models with Parametric Dependencies–The CIPM Approach

M Mazkatli, D Monschein, M Armbruster… - Available at SSRN …, 2022 - papers.ssrn.com
Explicitly considering the software architecture supports efficient assessments of quality
attributes. In particular, Architecture-based Performance Prediction (AbPP) supports …