Dataset for the publication Architectural Optimization for Confidentiality under Structural Uncertainty. The Zip file contains eclipse products containing our used models for the evaluation.This work was supported by the German Research Foundation (DFG) under project number 432576552, HE8596/1-1 (FluidTrust), as well as by funding from the topic Engineering Secure Systems (46.23.03) of the Helmholtz Association (HGF) and by KASTEL Security Research Labs. Additionally, it was supported by the Czech Science Foundation project 20-24814J, and also partially supported by Charles University institutional funding SVV 260451
Designing optimal architectures for software systems is difficult, as the number of design alternative...
In a connected world, confidentiality becomes increasingly critical. To cope with confidentiality on...
The paper presents the main characteristics of applications which are working with very large data s...
Dataset for the paper "A Classification of Software-Architectural Uncertainty regarding Confidential...
More and more connected systems gather and exchange data. This allows building smarter, more efficie...
Data set of the Paper "Architecture-based Uncertainty Impact Analysis to ensure Confidentiality". Fo...
Reproduction set for master thesis of Niko Benkler. Zip file contains code, data set and installati...
This data set contains the code and models used for the evaluation of the ICSA 2019 publication of t...
This dissertation addresses the confidentiality aspect of the information security problem from the ...
Dataset for the publication Architecture-based Attack Propagation and Variation Analysis for Identif...
The data set contains the results of the validation, the docker image for conducting the validation ...
Dataset for Paper "Tool-Supported Software Architecture-Based Data Flow Analysis for Confidentiality...
Software vendors must consider confidentiality especially while creating software architectures beca...
Dataset for our publication "Automatic Derivation of Vulnerability Models for Software Architectures
This data set contains the evaluation data of our publication on "Detecting Violations of Access Con...
Designing optimal architectures for software systems is difficult, as the number of design alternative...
In a connected world, confidentiality becomes increasingly critical. To cope with confidentiality on...
The paper presents the main characteristics of applications which are working with very large data s...
Dataset for the paper "A Classification of Software-Architectural Uncertainty regarding Confidential...
More and more connected systems gather and exchange data. This allows building smarter, more efficie...
Data set of the Paper "Architecture-based Uncertainty Impact Analysis to ensure Confidentiality". Fo...
Reproduction set for master thesis of Niko Benkler. Zip file contains code, data set and installati...
This data set contains the code and models used for the evaluation of the ICSA 2019 publication of t...
This dissertation addresses the confidentiality aspect of the information security problem from the ...
Dataset for the publication Architecture-based Attack Propagation and Variation Analysis for Identif...
The data set contains the results of the validation, the docker image for conducting the validation ...
Dataset for Paper "Tool-Supported Software Architecture-Based Data Flow Analysis for Confidentiality...
Software vendors must consider confidentiality especially while creating software architectures beca...
Dataset for our publication "Automatic Derivation of Vulnerability Models for Software Architectures
This data set contains the evaluation data of our publication on "Detecting Violations of Access Con...
Designing optimal architectures for software systems is difficult, as the number of design alternative...
In a connected world, confidentiality becomes increasingly critical. To cope with confidentiality on...
The paper presents the main characteristics of applications which are working with very large data s...