confidentiality

Mitigation strategies for confidentiality violations in software architecture using ranked feature importance

A quality attribute like confidentiality is critical to trustworthy software but unfortunately, very challenging to ensure. This is because modern software systems are complex and interconnected. Architecture-based confidentiality analysis enables …

Integrating Security-Enriched Data Flow Diagrams Into Architecture-Based Confidentiality Analysis

The increasing complexity of modern software systems presents developers with significant challenges regarding the confidentiality of sensitive data. To this end, data flow diagrams serve as an effective tool for identifying potential confidentiality …

ARC3N: A Collaborative Uncertainty Catalog to Address the Awareness Problem of Model-Based Confidentiality Analysis

Identifying confidentiality violations is challenging as modern software-intensive systems exchange and store large amounts of data, and system deployment and context vary. Although modelbased analyses can identify such violations already at design …

Architecture-based Propagation Analyses Regarding Security

In our modern world, the ever-expanding exchange of data and the increased complexity of interconnected software systems make software security challenging. Ideally, security concerns are already addressed early, as discussed with security by design. …