Cargando…

Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /

The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The metho...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Fischer-Hellmann, Klaus-Peter (Autor)
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Bischoff, Rainer (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Wiesbaden : Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg, 2012.
Edición:1st ed. 2012.
Colección:IT im Unternehmen, 1
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-8348-2618-3
003 DE-He213
005 20220120225412.0
007 cr nn 008mamaa
008 121116s2012 gw | s |||| 0|eng d
020 |a 9783834826183  |9 978-3-8348-2618-3 
024 7 |a 10.1007/978-3-8348-2618-3  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Fischer-Hellmann, Klaus-Peter.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Information Flow Based Security Control Beyond RBAC  |h [electronic resource] :  |b How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /  |c by Klaus-Peter Fischer-Hellmann ; edited by Rainer Bischoff. 
250 |a 1st ed. 2012. 
264 1 |a Wiesbaden :  |b Springer Fachmedien Wiesbaden :  |b Imprint: Springer Vieweg,  |c 2012. 
300 |a XXI, 161 p. 25 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a IT im Unternehmen,  |x 2522-0616 ;  |v 1 
505 0 |a Cross-Organisational Deployment of Business Processes.- Approaches to Specification and Enforcement of Security Policies -- Analysis of Security-Relevant Semantics of BPEL -- Security Policy Compliance Assessment for BPEL-Defined Processes -- Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows. 
520 |a The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing.Contents Cross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows Target Groups IT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs); Security Policy and Quality Assurance Officers and Managers; Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers; Interested Learners/Students in the Field of Security Management The Author Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. The Series "IT im Unternehmen" is edited by Prof. Dr. Rainer Bischoff. 
650 0 |a Data protection. 
650 0 |a Artificial intelligence-Data processing. 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Data Science. 
650 2 4 |a Coding and Information Theory. 
700 1 |a Bischoff, Rainer.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783834826176 
776 0 8 |i Printed edition:  |z 9783834826190 
830 0 |a IT im Unternehmen,  |x 2522-0616 ;  |v 1 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-8348-2618-3  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)