2019 IEEE International Conference on Software Architecture (ICSA) 2019
DOI: 10.1109/icsa.2019.00009
|View full text |Cite
|
Sign up to set email alerts
|

Data-Driven Software Architecture for Analyzing Confidentiality

Abstract: Preservation of confidentiality has become a crucial quality property of software systems that software vendors have to consider in each development phase. Especially, neglecting confidentiality constraints in the software architecture leads to severe issues in later phases that often are hard to correct. In contrast to the implementation phase, there is no support for systematically considering confidentiality in architectural design phases by means of data processing descriptions. To fill this gap, we introd… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
38
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(39 citation statements)
references
References 21 publications
1
38
0
Order By: Relevance
“…This can be defined as data flow constraint. We annotate the roles in Figure 1 similarly as in [4]: User, TravelAgency, Airline. Credit card details are only released for the User role.…”
Section: Running Examplementioning
confidence: 99%
See 4 more Smart Citations
“…This can be defined as data flow constraint. We annotate the roles in Figure 1 similarly as in [4]: User, TravelAgency, Airline. Credit card details are only released for the User role.…”
Section: Running Examplementioning
confidence: 99%
“…To cope with confidentiality early in design time, datadriven analyses have been proposed [4], [5]. These approaches are based on Data Flow Diagrams (DFDs) which are commonly used in threat modeling because security "problems tend to follow the data flow, not the control flow" [6].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations