[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …
reputation are potential consequences of not maintaining confidentiality, which is an …
Architectural attack propagation analysis for identifying confidentiality issues
Exchanging data between different systems enables us to build new smart services and
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …
Architectural optimization for confidentiality under structural uncertainty
More and more connected systems gather and exchange data. This allows building smarter,
more efficient and overall better systems. However, the exchange of data also leads to …
more efficient and overall better systems. However, the exchange of data also leads to …
FSECAM: A contextual thematic approach for linking feature to multi-level software architectural components
Linking software features to code components is commonly performed during software
development and maintenance, including to implement a feature, document code, design …
development and maintenance, including to implement a feature, document code, design …
[BOOK][B] Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
S Seifermann - 2022 - library.oapen.org
Software vendors must consider confidentiality especially while creating software
architectures because decisions made here are hard to change later. Our approach …
architectures because decisions made here are hard to change later. Our approach …
A survey of software architectural change detection and categorization techniques
Software architecture is defined as the structural construction, design decisions
implementation, evolution and knowledge sharing mechanisms of a system. Software …
implementation, evolution and knowledge sharing mechanisms of a system. Software …
[HTML][HTML] Reconstruction of an execution architecture view by identifying map** rules for connectors
An execution architecture view plays a crucial role in depicting the structure of a software
system at runtime and analyzing its execution aspects, such as concurrency and …
system at runtime and analyzing its execution aspects, such as concurrency and …
Commit-Based Continuous Integration of Performance Models
M Armbruster - Softwaretechnik-Trends Band 43, Heft 2, 2023 - dl.gi.de
Architecture-level performance models (aPM) such as the Palladio Component Model
(PCM) can be used for, eg, performance predictions to explore design alternatives and …
(PCM) can be used for, eg, performance predictions to explore design alternatives and …
Quantifying Software Correctness by Combining Architecture Modeling and Formal Program Analysis
Most formal methods see the correctness of a software system as a binary decision.
However, proving the correctness of complex systems completely is difficult because they …
However, proving the correctness of complex systems completely is difficult because they …
[PDF][PDF] Continuous Integration of Architectural Performance Models with Parametric Dependencies–The CIPM Approach
Explicitly considering the software architecture supports efficient assessments of quality
attributes. In particular, Architecture-based Performance Prediction (AbPP) supports …
attributes. In particular, Architecture-based Performance Prediction (AbPP) supports …