Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The metho...
|Main Author:||Fischer-Hellmann, Klaus-Peter.|
|Corporate Author:||SpringerLink (Online service)|
|Other Authors:||Bischoff, Rainer.|
Springer Fachmedien Wiesbaden :
IT im Unternehmen ;
No Tags, Be the first to tag this record!
- Cross-Organisational Deployment of Business Processes.- Approaches to Specification and Enforcement of Security Policies
- Analysis of Security-Relevant Semantics of BPEL
- Security Policy Compliance Assessment for BPEL-Defined Processes
- Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows.