Detecting violations of access control and information flow policies in data flow diagrams.
Stephan SeifermannRobert HeinrichDominik WerleRalf H. ReussnerPublished in: J. Syst. Softw. (2022)
Keyphrases
- data flow
- information flow
- access control
- access control policies
- role based access control
- fine grained
- control flow
- dynamic access control
- data security
- access control models
- information security
- communication networks
- access control systems
- access control mechanism
- security policies
- social networks
- conflict resolution
- rbac model
- supply chain
- security mechanisms
- workflow systems
- database security
- database management systems
- software engineering
- databases