data flow diagram

Integrating Security-Enriched Data Flow Diagrams Into Architecture-Based Confidentiality Analysis

The increasing complexity of modern software systems presents developers with significant challenges regarding the confidentiality of sensitive data. To this end, data flow diagrams serve as an effective tool for identifying potential confidentiality …

Analyzing Cyclic Data Flow Diagrams Regarding Information Security

Data flow diagrams are commonly used in system design to represent data processing and exchange. They are valuable in security analysis due to their applicability in assessing information security-related properties like confidentiality. However, …

Towards a Data Flow Diagram-Centric Confidentiality Analysis in Palladio

The Palladio approach enables software architects to create architectural models of their systems for early cost, performance, and maintainability analysis. Using a data flow-based confidentiality analysis, it is also possible to detect …