data flow analysis

Mitigation strategies for confidentiality violations in software architecture using ranked feature importance

A quality attribute like confidentiality is critical to trustworthy software but unfortunately, very challenging to ensure. This is because modern software systems are complex and interconnected. Architecture-based confidentiality analysis enables …

Analyzing Cyclic Data Flow Diagrams Regarding Information Security

Data flow diagrams are commonly used in system design to represent data processing and exchange. They are valuable in security analysis due to their applicability in assessing information security-related properties like confidentiality. However, …