Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The metho...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Fischer-Hellmann, Klaus-Peter (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Otros Autores: | Bischoff, Rainer (Editor ) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Wiesbaden :
Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg,
2012.
|
Edición: | 1st ed. 2012. |
Colección: | IT im Unternehmen,
1 |
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
QC-LDPC Code-Based Cryptography
por: Baldi, Marco
Publicado: (2014) -
Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings /
Publicado: (2015) -
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers /
Publicado: (2013) -
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers /
Publicado: (2014) -
Pairing-Based Cryptography -- Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers /
Publicado: (2013)