More and more connected systems gather and exchange data. This allows building smarter, more efficient and overall better systems. However, the exchange of data also leads to questions regarding the confidentiality of these systems. Design notions such as Security by Design or Privacy by Design help to build secure and confidential systems by considering confidentiality already at the design-time. During the design-time, different analyses can support the architect. However, essential properties that impact confidentiality, such as the deployment, might be unknown during the design-time, leading to structural uncertainty about the architecture and its confidentiality. Structural uncertainty in the software architecture represen...
Abstract: Computer software is a major source of security risks in information systems. To deal with...
Designing optimal architectures for software systems is difficult, as the number of design alternative...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
In a connected world, confidentiality becomes increasingly critical. To cope with confidentiality on...
Software vendors must consider confidentiality especially while creating software architectures beca...
This dissertation addresses the confidentiality aspect of the information security problem from the ...
Meeting confidentiality requirements in software systems is vital for organizations. Considering con...
Dataset for the publication Architectural Optimization for Confidentiality under Structural Uncertai...
Dataset for the paper "A Classification of Software-Architectural Uncertainty regarding Confidential...
Secure development processes integrate security-related concerns into the software development life-...
Data set of the Paper "Architecture-based Uncertainty Impact Analysis to ensure Confidentiality". Fo...
This paper analyses how ITS applications may embrace a privacy-by-design approach. We take a holisti...
In this paper, we propose a simple solution to the problem of estimating uncertainty of the results ...
Violations of the privacy of users can happen if data protection is not a fundamental part of the de...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
Abstract: Computer software is a major source of security risks in information systems. To deal with...
Designing optimal architectures for software systems is difficult, as the number of design alternative...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
In a connected world, confidentiality becomes increasingly critical. To cope with confidentiality on...
Software vendors must consider confidentiality especially while creating software architectures beca...
This dissertation addresses the confidentiality aspect of the information security problem from the ...
Meeting confidentiality requirements in software systems is vital for organizations. Considering con...
Dataset for the publication Architectural Optimization for Confidentiality under Structural Uncertai...
Dataset for the paper "A Classification of Software-Architectural Uncertainty regarding Confidential...
Secure development processes integrate security-related concerns into the software development life-...
Data set of the Paper "Architecture-based Uncertainty Impact Analysis to ensure Confidentiality". Fo...
This paper analyses how ITS applications may embrace a privacy-by-design approach. We take a holisti...
In this paper, we propose a simple solution to the problem of estimating uncertainty of the results ...
Violations of the privacy of users can happen if data protection is not a fundamental part of the de...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
Abstract: Computer software is a major source of security risks in information systems. To deal with...
Designing optimal architectures for software systems is difficult, as the number of design alternative...
This paper presents a practical and formal approach to analyze security-centric information flow pol...