Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The metho...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Wiesbaden :
Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg,
2012.
|
Edición: | 1st ed. 2012. |
Colección: | IT im Unternehmen,
1 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Cross-Organisational Deployment of Business Processes.- Approaches to Specification and Enforcement of Security Policies
- Analysis of Security-Relevant Semantics of BPEL
- Security Policy Compliance Assessment for BPEL-Defined Processes
- Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows.