Many software systems have to be designed and developed in a way that guarantees that specific information remains confidential with respect to considered adversaries. Such guarantees depend on the internal information flow inside individual components and the system architecture, e.g., the deployment on hardware nodes and properties of their communication links. Therefore, we propose a novel architecture-driven approach for specifying and analyzing the confidentiality of information processed by component-based systems. It includes an architectural analysis that is able to infer leaks of confidential information from abstract architecture models, adversary models, and confidentiality specifications. Our approach supports re-usability of co...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Security is no sugar coating that can be added to a software system as an afterthought; a software s...
The Architectural Attack Propagation Analysis for Identifying Confidentiality Issues proposed by Wal...
Protecting confidentiality of data manipulated by programs is a growing concern in various applicati...
Software vendors must consider confidentiality especially while creating software architectures beca...
In a connected world, confidentiality becomes increasingly critical. To cope with confidentiality on...
International audienceThis paper proposes a formal framework for studying information flow security ...
Meeting confidentiality requirements in software systems is vital for organizations. Considering con...
This dissertation addresses the confidentiality aspect of the information security problem from the ...
AbstractWe present a powerful and flexible method for automatically checking the secrecy of values i...
Exchanging data between different systems enables us to build new smart services and digitise variou...
The preservation of any security property for the composition of components in software engineering ...
In this technical report we provide the documentation of the functional requirements of a component-...
International audienceThe preservation of any security property for the composition of components in...
More and more connected systems gather and exchange data. This allows building smarter, more efficie...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Security is no sugar coating that can be added to a software system as an afterthought; a software s...
The Architectural Attack Propagation Analysis for Identifying Confidentiality Issues proposed by Wal...
Protecting confidentiality of data manipulated by programs is a growing concern in various applicati...
Software vendors must consider confidentiality especially while creating software architectures beca...
In a connected world, confidentiality becomes increasingly critical. To cope with confidentiality on...
International audienceThis paper proposes a formal framework for studying information flow security ...
Meeting confidentiality requirements in software systems is vital for organizations. Considering con...
This dissertation addresses the confidentiality aspect of the information security problem from the ...
AbstractWe present a powerful and flexible method for automatically checking the secrecy of values i...
Exchanging data between different systems enables us to build new smart services and digitise variou...
The preservation of any security property for the composition of components in software engineering ...
In this technical report we provide the documentation of the functional requirements of a component-...
International audienceThe preservation of any security property for the composition of components in...
More and more connected systems gather and exchange data. This allows building smarter, more efficie...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Security is no sugar coating that can be added to a software system as an afterthought; a software s...
The Architectural Attack Propagation Analysis for Identifying Confidentiality Issues proposed by Wal...