Previous Next Methods Allocation  
Annex 1  
5.1.2.1 Information Flow Analysis  

  Informationsflu▀analyse

Contents  
  • 1 Identification/Definition of the Method
  • 2 Brief Characteristic of the Method
  • 3 Application of the Method in the V-Model
  • 4 Interfaces
  • 5 Further Information
  • 6 Literature
  • 1 Identification/Definition of the Method

    /Denning, 1982/ chap. 5.6

    2 Brief Characteristic of the Method

    For every program statement and every variable it is investigated whether an information flow between two variables takes place and whether this information flow is permissible.

    3 Application of the Method in the V-Model

    Within the V-Model an analysis of covert channels is not required. The ACC - Analysis of Covert Channels has to be performed if within the security requirements according to /ITSEC/ covert channels are excluded.

    4 Interfaces

    In principle, there are interfaces to all methods that generate an analysis basis (program, formal specification).

    5 Further Information

    - not applicable -

    6 Literature

    /Denning, 1982/ Training book for cryptographic and data security, especially information flow analysis

    Previous Next GDPA Online Last Updated 01.Jan.2002 Updated by Webmaster Last Revised 01.Jan.2002 Revised by Webmaster