The Resource Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic resource)

Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic resource)

Label
Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
Title
Information flow based security control beyond RBAC
Title remainder
how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
Statement of responsibility
Klaus-Peter Fischer-Hellmann
Creator
Subject
Language
  • eng
  • ger
  • eng
Summary
The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing.ContentsCross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud WorkflowsTarget GroupsIT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs); Security Policy and Quality Assurance Officers and Managers;Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers; Interested Learners/Students in the Field of Security ManagementThe AuthorKlaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level.Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level.The Series "IT im Unternehmen" is edited by Prof. Dr. Rainer Bischoff
Cataloging source
GW5XE
Index
index present
Language note
Text in English; Foreword in German
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
Corporate IT
Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic resource)
Label
Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic resource)
Link
http://dx.doi.org/10.1007/978-3-8348-2618-3
Publication
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Color
multicolored
Contents
  • Conclusions and Directions of Further Research and Development
  • XML Schema for Security Policy Statement
  • Outline of Sophisticated Covert Channel Prevention for Activity validate
  • Introduction
  • Cross-Organisational Deployment of Business Processes
  • Approaches to Specification and Enforcement of Security Policies
  • Analysis of Security-Relevant Semantics of BPEL
  • Specification of Security Policy for Compliance Assessment of CBPs
  • Security Policy Compliance Assessment for BPEL Scripts
  • Proof of Concept by Prototypical Implementation
  • Extending Results to Grid and Cloud Computing
Control code
ocn820020526
http://library.link/vocab/cover_art
http://covers.openlibrary.org/b/isbn/9783834826183-M.jpg?default=false
Dimensions
unknown
http://library.link/vocab/discovery_link
{'ERDC_HANOV': 'http://acwc.sdp.sirsi.net/client/en_US/default/search/detailnonmodal/ent:$002f$002fSD_ILS$002f0$002fSD_ILS:272909/ada'}
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9783834826183
Isbn Type
(electronic bk.)
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)820020526

Library Locations

    • ERDC - Hanover (US Army Engineer Research and Development Center) Borrow it
      72 Lyme Road, Hanover, NH, 03755-1290, US
      43.7279642 -72.2684934
Processing Feedback ...