loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Stephan Seifermann ; Robert Heinrich ; Dominik Werle and Ralf Reussner

Affiliation: KASTEL – Institute of Information Security and Dependability, Karlsruhe Institute of Technology, Germany

Keyword(s): Access Control, Information Flow, Software Architecture, Confidentiality, Analysis Automation.

Abstract: Software architectures allow identifying confidentiality issues early and in a cost-efficient way. Information Flow (IF) and Access Control (AC) are established confidentiality mechanisms, so modeling and analysis approaches should support them. Because confidentiality issues often trace back to data usage, data-oriented approaches are promising. However, we could not identify a data-oriented approach handling both, IF and AC. Therefore, we present a unified data-oriented modeling and analysis approach supporting both, IF and AC, within the same model in this paper. We demonstrate the integration into an existing architectural description language and evaluate the resulting expressiveness and accuracy by a case study considering 22 cases.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.12.71.237

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Seifermann, S.; Heinrich, R.; Werle, D. and Reussner, R. (2021). A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures. In Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-524-1; ISSN 2184-7711, SciTePress, pages 26-37. DOI: 10.5220/0010515300260037

@conference{secrypt21,
author={Stephan Seifermann. and Robert Heinrich. and Dominik Werle. and Ralf Reussner.},
title={A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures},
booktitle={Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT},
year={2021},
pages={26-37},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010515300260037},
isbn={978-989-758-524-1},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT
TI - A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures
SN - 978-989-758-524-1
IS - 2184-7711
AU - Seifermann, S.
AU - Heinrich, R.
AU - Werle, D.
AU - Reussner, R.
PY - 2021
SP - 26
EP - 37
DO - 10.5220/0010515300260037
PB - SciTePress