Logo des Repositoriums
 

Analyzing Cyclic Data Flow Diagrams Regarding Information Security

dc.contributor.authorArp, Benjamin
dc.contributor.authorNiehues, Nils
dc.contributor.authorHüller, Tom
dc.contributor.authorSchwickerath, Felix
dc.contributor.authorBoltz, Nicolas
dc.contributor.authorHahner, Sebastian
dc.contributor.editorHerrmann, Andrea
dc.date.accessioned2025-01-08T13:31:06Z
dc.date.available2025-01-08T13:31:06Z
dc.date.issued2024
dc.description.abstractData flow diagrams are commonly used in system design to represent data processing and exchange. They are valuable in security analysis due to their applicability in assessing information security-related properties like confidentiality. However, many existing tools for data flow analysis are limited by the assumption that data flows form acyclic graphs, which inhibits the analysis of cyclic data flows, common in real-world software systems. This paper addresses this gap by implementing a novel method to resolve cycles in data flow diagrams while preserving their semantics regarding information security. We validate our method, ensuring it is accurate, lucid and preserves information security-related behavior.en
dc.identifier.issn0720-8928
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/45545
dc.language.isoen
dc.pubPlaceBonn
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSoftwaretechnik-Trends Band 44, Heft 4
dc.relation.ispartofseriesSoftwaretechnik-Trends
dc.subjectdata flow diagram
dc.subjectsecurity analysis
dc.subjectdata flow analysis
dc.subjectcycle
dc.subjectsecurity
dc.titleAnalyzing Cyclic Data Flow Diagrams Regarding Information Securityen
dc.typeText/Conference Paper
mci.conference.dateNovember 6-7, 2024
mci.conference.locationLinz, Austria
mci.conference.sessiontitle15th Symposium on Software Performance 2024
mci.reference.pages45-47

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
SSP24_14_camera-ready_1000.pdf
Größe:
263.14 KB
Format:
Adobe Portable Document Format