My Account Log in

1 option

Information Flow Based Security Control Beyond RBAC : How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) / by Klaus-Peter Fischer-Hellmann ; edited by Rainer Bischoff.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Author/Creator:
Fischer-Hellmann, Klaus-Peter, author.
Contributor:
Bischoff, Rainer, 1956- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
IT im Unternehmen, 2522-0608 ; 1.
IT im Unternehmen, 2522-0608 ; 1
Language:
English
Subjects (All):
Computer security.
Data structures (Computer science).
Coding theory.
Information theory.
Systems and Data Security.
Data Structures.
Coding and Information Theory.
Local Subjects:
Systems and Data Security.
Data Structures.
Coding and Information Theory.
Physical Description:
1 online resource (XXI, 161 pages) : 25 illustrations.
Edition:
First edition 2012.
Contained In:
Springer eBooks
Place of Publication:
Wiesbaden : Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg, 2012.
System Details:
text file PDF
Summary:
The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing.Contents Cross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows Target Groups IT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs); Security Policy and Quality Assurance Officers and Managers; Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers; Interested Learners/Students in the Field of Security Management The Author Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. The Series "IT im Unternehmen" is edited by Prof. Dr. Rainer Bischoff.
Contents:
Cross-Organisational Deployment of Business Processes.- Approaches to Specification and Enforcement of Security Policies
Analysis of Security-Relevant Semantics of BPEL
Security Policy Compliance Assessment for BPEL-Defined Processes
Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows.
Other Format:
Printed edition:
ISBN:
978-3-8348-2618-3
9783834826183
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account