Security and privacy requirements for the internet of things: A survey

N Alhirabi, O Rana, C Perera - ACM Transactions on Internet of Things, 2021 - dl.acm.org
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams

S Seifermann, R Heinrich, D Werle… - Journal of Systems and …, 2022 - Elsevier
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …

Flaws in flows: Unveiling design flaws via information flow analysis

K Tuma, R Scandariato, M Balliu - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
This paper presents a practical and formal approach to analyze security-centric information
flow policies at the level of the design model. Specifically, we focus on data confidentiality …

[PDF][PDF] A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.

S Seifermann, R Heinrich, D Werle, RH Reussner - SECRYPT, 2021 - scitepress.org
Software architectures allow identifying confidentiality issues early and in a cost-efficient
way. Information Flow (IF) and Access Control (AC) are established confidentiality …

Hardware acceleration implementation of sparse coding algorithm with spintronic devices

D Zhang, Y Hou, C Wang, J Chen, L Zeng… - Proceedings of the 14th …, 2018 - dl.acm.org
In this paper, we explore the possibility of hardware acceleration implementation of sparse
coding algorithm with spintronic devices by a series of design optimizations across the …

[图书][B] Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

S Seifermann - 2022 - library.oapen.org
Software vendors must consider confidentiality especially while creating software
architectures because decisions made here are hard to change later. Our approach …

Evolution of secure development lifecycles and maturity models in the context of hosted solutions

F Lange, I Kunz - Journal of Software: Evolution and Process, 2024 - Wiley Online Library
Organizations creating software commonly utilize software development lifecycles (SDLCs)
to structure development activities. Secure development lifecycles (SDLs) integrate into …

Security patterns 2.0: towards security patterns based on security building blocks

A van Den Berghe, K Yskout, W Joosen - Proceedings of the 1st …, 2018 - dl.acm.org
Security patterns are intended to package reusable security solutions and have received
considerable research attention in the two decades since their introduction. Practitioners …

A lingua franca for security by design

A Van Den Berghe, K Yskout… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
The principle of security by design is advocated by academia as well as industry.
Unfortunately, its adoption in practice is not yet widespread. We believe a reason for this is …

Efficiency and automation in threat analysis of software systems

K Tuma - 2021 - search.proquest.com
Context: Security is a growing concern in many organizations. Industries developing
software systems plan for security early-on to minimize expensive code refactorings after …