The focus of this research work is to investigate the problem of developing secure software applications. Currently, proposed solutions focus on data flow across so-called trust boundaries. The challenge with the current approach is that many of our applications' threats are not from malicious users. Many threats come from poor design, misunderstanding of use cases, and a lack of planning for environmental changes. Our focus in this work is on modeling a distributed process where risks to the software can be discovered in the design and the risk mitigated.

Author: Aspen Olmsted

Published in: International Conference for Internet Technology and Secured Transactions (ICITST-2023)

  • Date of Conference: 13-15 November 2023
  • DOI: 10.20533/ICITST.2023.0017
  • ISBN: 978-1-913572-63-1
  • Conference Location: St Anne’s College, Oxford University, UK