The Resource Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)
Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)
Resource Information
The item Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.This item is available to borrow from 1 library branch.
Resource Information
The item Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.
This item is available to borrow from 1 library branch.
- Summary
- The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing. ContentsCross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud WorkflowsTarget GroupsIT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs); Security Policy and Quality Assurance Officers and Managers;Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers; Interested Learners/Students in the Field of Security ManagementThe AuthorKlaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. The Series "IT im Unternehmen" is edited by Prof. Dr. Rainer Bischoff
- Language
-
- eng
- ger
- eng
- Extent
- 1 online resource.
- Contents
-
- Conclusions and Directions of Further Research and Development
- XML Schema for Security Policy Statement
- Outline of Sophisticated Covert Channel Prevention for Activity validate
- Introduction
- Cross-Organisational Deployment of Business Processes
- Approaches to Specification and Enforcement of Security Policies
- Analysis of Security-Relevant Semantics of BPEL
- Specification of Security Policy for Compliance Assessment of CBPs
- Security Policy Compliance Assessment for BPEL Scripts
- Proof of Concept by Prototypical Implementation
- Extending Results to Grid and Cloud Computing
- Isbn
- 9783834826183
- Label
- Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
- Title
- Information flow based security control beyond RBAC
- Title remainder
- how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
- Statement of responsibility
- Klaus-Peter Fischer-Hellmann
- Language
-
- eng
- ger
- eng
- Summary
- The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing. ContentsCross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud WorkflowsTarget GroupsIT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs); Security Policy and Quality Assurance Officers and Managers;Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers; Interested Learners/Students in the Field of Security ManagementThe AuthorKlaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. The Series "IT im Unternehmen" is edited by Prof. Dr. Rainer Bischoff
- Cataloging source
- GW5XE
- http://library.link/vocab/creatorDate
- 1952-
- http://library.link/vocab/creatorName
- Fischer, Peter
- Dewey number
- 005.8
- Index
- index present
- Language note
- Text in English; Foreword in German
- LC call number
- TK5105.597
- LC item number
- .F57 2012
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- Series statement
- Corporate IT
- http://library.link/vocab/subjectName
-
- Computer networks
- Flow control (Data transmission systems)
- BPEL (Computer program language)
- Management information systems
- Label
- Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Conclusions and Directions of Further Research and Development
- XML Schema for Security Policy Statement
- Outline of Sophisticated Covert Channel Prevention for Activity validate
- Introduction
- Cross-Organisational Deployment of Business Processes
- Approaches to Specification and Enforcement of Security Policies
- Analysis of Security-Relevant Semantics of BPEL
- Specification of Security Policy for Compliance Assessment of CBPs
- Security Policy Compliance Assessment for BPEL Scripts
- Proof of Concept by Prototypical Implementation
- Extending Results to Grid and Cloud Computing
- Control code
- SPR820020526
- Dimensions
- unknown
- Extent
- 1 online resource.
- File format
- unknown
- Form of item
- online
- Isbn
- 9783834826183
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Reproduction note
- Electronic resource.
- Sound
- unknown sound
- Specific material designation
- remote
- Label
- Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Conclusions and Directions of Further Research and Development
- XML Schema for Security Policy Statement
- Outline of Sophisticated Covert Channel Prevention for Activity validate
- Introduction
- Cross-Organisational Deployment of Business Processes
- Approaches to Specification and Enforcement of Security Policies
- Analysis of Security-Relevant Semantics of BPEL
- Specification of Security Policy for Compliance Assessment of CBPs
- Security Policy Compliance Assessment for BPEL Scripts
- Proof of Concept by Prototypical Implementation
- Extending Results to Grid and Cloud Computing
- Control code
- SPR820020526
- Dimensions
- unknown
- Extent
- 1 online resource.
- File format
- unknown
- Form of item
- online
- Isbn
- 9783834826183
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Reproduction note
- Electronic resource.
- Sound
- unknown sound
- Specific material designation
- remote
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Information-flow-based-security-control-beyond/rjBfHQ6y9Tg/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Information-flow-based-security-control-beyond/rjBfHQ6y9Tg/">Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Information-flow-based-security-control-beyond/rjBfHQ6y9Tg/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Information-flow-based-security-control-beyond/rjBfHQ6y9Tg/">Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>