Privacy, like security, is a non-functional property, yet most software design tools are focused on functional aspects, using for instance Data Flow Diagrams (DFDs). In previous work, a conceptual model was introduced where DFDs were extended into so-called Privacy-Aware Data Flow Diagrams (PA-DFDs) with the aim of adding specific privacy checks to existing DFDs. An implementation to add such automatic checks has also been developed. In this paper, we define the notion of refinement for both DFDs and PA-DFDs as a special type of structure-preserving map (or graph homomorphism). We also provide three algorithms to find, check and transform refinements, and we show that the standard diagram "transform→refine/refine→transform" commutes. We hav...
The verification of information flow properties of security devices is difficult because it involves...
In this paper we discuss the use of views to address the problem of providing useful answers to prov...
Abstract. We address the problem of maintaining information flow security un-der refinement and tran...
Most software design tools, as for instance Data Flow Diagrams (DFDs), are focused on functional asp...
Data Flow Diagrams (DFDs) are primarily used for modelling functional properties of a system. In rec...
Privacy of personal data in information systems is gaining importance rapidly. Although data flow di...
The security of software-intensive systems is frequently attacked. High fines or loss in reputation ...
© Springer International Publishing AG, part of Springer Nature 2018. Data privacy is a cross-cuttin...
In the last decade, information technologies have been developing dramatically, and therefore data h...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
-We address the problem of maintaining information flow security under refinement and transformation...
In the real world, graph structured data is ubiquitous. For example, social networks, communications...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Threat modelling refers to a number of systematic approaches for eliciting security and/or privacy t...
We address the problem of maintaining information flow security un-der refinement and transformation...
The verification of information flow properties of security devices is difficult because it involves...
In this paper we discuss the use of views to address the problem of providing useful answers to prov...
Abstract. We address the problem of maintaining information flow security un-der refinement and tran...
Most software design tools, as for instance Data Flow Diagrams (DFDs), are focused on functional asp...
Data Flow Diagrams (DFDs) are primarily used for modelling functional properties of a system. In rec...
Privacy of personal data in information systems is gaining importance rapidly. Although data flow di...
The security of software-intensive systems is frequently attacked. High fines or loss in reputation ...
© Springer International Publishing AG, part of Springer Nature 2018. Data privacy is a cross-cuttin...
In the last decade, information technologies have been developing dramatically, and therefore data h...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
-We address the problem of maintaining information flow security under refinement and transformation...
In the real world, graph structured data is ubiquitous. For example, social networks, communications...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Threat modelling refers to a number of systematic approaches for eliciting security and/or privacy t...
We address the problem of maintaining information flow security un-der refinement and transformation...
The verification of information flow properties of security devices is difficult because it involves...
In this paper we discuss the use of views to address the problem of providing useful answers to prov...
Abstract. We address the problem of maintaining information flow security un-der refinement and tran...