Architectural Alignment of Access Control Requirements Extracted from Business Processes

Architectural Alignment of Access Control Requirements Extracted from Business Processes
Author: Pilipchuk, Roman
Publsiher: KIT Scientific Publishing
Total Pages: 366
Release: 2023-01-27
Genre: Computers
ISBN: 9783731512127

Download Architectural Alignment of Access Control Requirements Extracted from Business Processes Book in PDF, Epub and Kindle

Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.

Architectural Alignment of Access Control Requirements Extracted from Business Processes

Architectural Alignment of Access Control Requirements Extracted from Business Processes
Author: Roman Pilipchuk
Publsiher: Unknown
Total Pages: 135
Release: 2021
Genre: Electronic Book
ISBN: OCLC:1289926874

Download Architectural Alignment of Access Control Requirements Extracted from Business Processes Book in PDF, Epub and Kindle

Evaluating Architectural Safeguards for Uncertain AI Black Box Components

Evaluating Architectural Safeguards for Uncertain AI Black Box Components
Author: Scheerer, Max
Publsiher: KIT Scientific Publishing
Total Pages: 472
Release: 2023-10-23
Genre: Electronic Book
ISBN: 9783731513209

Download Evaluating Architectural Safeguards for Uncertain AI Black Box Components Book in PDF, Epub and Kindle

Although tremendous progress has been made in Artificial Intelligence (AI), it entails new challenges. The growing complexity of learning tasks requires more complex AI components, which increasingly exhibit unreliable behaviour. In this book, we present a model-driven approach to model architectural safeguards for AI components and analyse their effect on the overall system reliability.

A Reference Structure for Modular Model based Analyses

A Reference Structure for Modular Model based Analyses
Author: Koch, Sandro Giovanni
Publsiher: KIT Scientific Publishing
Total Pages: 398
Release: 2024-04-25
Genre: Electronic Book
ISBN: 9783731513414

Download A Reference Structure for Modular Model based Analyses Book in PDF, Epub and Kindle

In this work, the authors analysed the co-dependency between models and analyses, particularly the structure and interdependence of artefacts and the feature-based decomposition and composition of model-based analyses. Their goal is to improve the maintainability of model-based analyses. They have investigated the co-dependency of Domain-specific Modelling Languages (DSMLs) and model-based analyses regarding evolvability, understandability, and reusability.

Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
Author: Seifermann, Stephan
Publsiher: KIT Scientific Publishing
Total Pages: 412
Release: 2022-12-09
Genre: Computers
ISBN: 9783731512462

Download Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements Book in PDF, Epub and Kindle

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.

Architecture based Evolution of Dependable Software intensive Systems

Architecture based Evolution of Dependable Software intensive Systems
Author: Heinrich, Robert
Publsiher: KIT Scientific Publishing
Total Pages: 154
Release: 2023-06-05
Genre: Electronic Book
ISBN: 9783731512943

Download Architecture based Evolution of Dependable Software intensive Systems Book in PDF, Epub and Kindle

This cumulative habilitation thesis, proposes concepts for (i) modelling and analysing dependability based on architectural models of software-intensive systems early in development, (ii) decomposition and composition of modelling languages and analysis techniques to enable more flexibility in evolution, and (iii) bridging the divergent levels of abstraction between data of the operation phase, architectural models and source code of the development phase.

Consistent View Based Management of Variability in Space and Time

Consistent View Based Management of Variability in Space and Time
Author: Ananieva, Sofia
Publsiher: KIT Scientific Publishing
Total Pages: 310
Release: 2022-12-06
Genre: Computers
ISBN: 9783731512417

Download Consistent View Based Management of Variability in Space and Time Book in PDF, Epub and Kindle

Developing variable systems faces many challenges. Dependencies between interrelated artifacts within a product variant, such as code or diagrams, across product variants and across their revisions quickly lead to inconsistencies during evolution. This work provides a unification of common concepts and operations for variability management, identifies variability-related inconsistencies and presents an approach for view-based consistency preservation of variable systems.

COBIT 5 for Information Security

COBIT 5 for Information Security
Author: ISACA
Publsiher: ISACA
Total Pages: 220
Release: 2012
Genre: Business & Economics
ISBN: 9781604202540

Download COBIT 5 for Information Security Book in PDF, Epub and Kindle

COBIT 5 provides a comprehensive framework that assists enterprises in achieving their objectives for the governance and management of enterprise IT. COBIT 5 enables IT to be governed and managed in a holistic manner for the entire enterprise, taking into account the full end-to-end business and IT functional areas of responsibility, considering IT-related interests of internal and external stakeholders.