000 04337nam a22005055i 4500
001 978-3-8348-2618-3
003 DE-He213
005 20140220083332.0
007 cr nn 008mamaa
008 121116s2012 gw | s |||| 0|eng d
020 _a9783834826183
_9978-3-8348-2618-3
024 7 _a10.1007/978-3-8348-2618-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aFischer-Hellmann, Klaus-Peter.
_eauthor.
245 1 0 _aInformation Flow Based Security Control Beyond RBAC
_h[electronic resource] :
_bHow to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
_cby Klaus-Peter Fischer-Hellmann ; edited by Rainer Bischoff.
264 1 _aWiesbaden :
_bSpringer Fachmedien Wiesbaden :
_bImprint: Springer Vieweg,
_c2012.
300 _aXXI, 161 p. 25 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIT im Unternehmen ;
_v1
505 0 _aCross-Organisational Deployment of Business Processes.- Approaches to Specification and Enforcement of Security Policies -- Analysis of Security-Relevant Semantics of BPEL -- Security Policy Compliance Assessment for BPEL-Defined Processes -- Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows.
520 _aThe book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing.Contents Cross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows Target Groups IT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs); Security Policy and Quality Assurance Officers and Managers; Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers; Interested Learners/Students in the Field of Security Management The Author Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. The Series "IT im Unternehmen" is edited by Prof. Dr. Rainer Bischoff.
650 0 _aComputer science.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aCoding theory.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aData Structures.
650 2 4 _aCoding and Information Theory.
700 1 _aBischoff, Rainer.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783834826176
830 0 _aIT im Unternehmen ;
_v1
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-8348-2618-3
912 _aZDB-2-SCS
999 _c103973
_d103973