University of Oulu

Kupfersberger, V., Schaberreiter, T., & Quirchmayr, G. (2018). Security-Driven Information Flow Modelling for Component Integration in Complex Environments. In Proceedings of the 10th International Conference on Advances in Information Technology - IAIT 2018. ACM Press. https://doi.org/10.1145/3291280.3291797

Security-driven information flow modelling for component integration in complex environments

Saved in:
Author: Kupfersberger, Veronika1; Schaberreiter, Thomas1; Quirchmayr, Gerald1
Organizations: 1University of Vienna, Vienna, Austria
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 0.7 MB)
Persistent link: http://urn.fi/urn:nbn:fi-fe2019070422770
Language: English
Published: Association for Computing Machinery, 2018
Publish Date: 2019-07-04
Description:

Abstract

Conceptualising and developing a new software solution is always a daunting task, even more so when existing technologies of international partners are to be integrated into a unique and holistic product, as is the case in many international research and innovation projects. The individual requirements not only of each tool, but of the resulting solution as a whole, must be considered as well as the problem domain. The approach presented in this paper uniquely combines existing structuring and modelling techniques, resulting in an information flow model and interface definition specifications appropriate for international projects. It is based on an approach developed for an EU cybersecurity project and for its specific requirements, but due to its flexibility seen as appropriate for other domains as well. Complex systems consisting of different existing software solutions are represented in a conceptual model of their internal processes and the connecting information flows, thereby facilitating further software development and adaptations. Additionally, the exact identification and accounting of all information flows are essential requirements for modelling according to security and privacy by design principles, as for example prescribed by privacy and impact assessment guides and required by the General Data Protection Regulation (GDPR).

see all

ISBN Print: 978-1-4503-6568-0
Article number: 19
DOI: 10.1145/3291280.3291797
OADOI: https://oadoi.org/10.1145/3291280.3291797
Host publication: IAIT 2018 : proceedings of the 10th International Conference on Advances in Information Technology
Conference: International Conference on Advances in Information Technology
Type of Publication: A4 Article in conference proceedings
Field of Science: 113 Computer and information sciences
Subjects:
Funding: The authors would like to thank the EU H2020 project CS-AWARE (grant number 740723) for supporting the research presented in this work.
EU Grant Number: (740723) CS-AWARE - A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis
Copyright information: © 2018 Copyright held by the owner/author(s). Publication rights licensed to Association for Computing Machinery. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in IAIT 2018 : proceedings of the 10th International Conference on Advances in Information Technology, https://doi.org/10.1145/3291280.3291797.