Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)
Resource Information
The instance Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book) represents a material embodiment of a distinct intellectual or artistic creation found in University of Liverpool. This resource is a combination of several types including: Instance, Electronic.
The Resource
Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)
Resource Information
The instance Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book) represents a material embodiment of a distinct intellectual or artistic creation found in University of Liverpool. This resource is a combination of several types including: Instance, Electronic.
- Label
- Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)
- Title remainder
- how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
- Medium
- electronic book
- Statement of responsibility
- Klaus-Peter Fischer-Hellmann
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Conclusions and Directions of Further Research and Development
- XML Schema for Security Policy Statement
- Outline of Sophisticated Covert Channel Prevention for Activity validate
- Introduction
- Cross-Organisational Deployment of Business Processes
- Approaches to Specification and Enforcement of Security Policies
- Analysis of Security-Relevant Semantics of BPEL
- Specification of Security Policy for Compliance Assessment of CBPs
- Security Policy Compliance Assessment for BPEL Scripts
- Proof of Concept by Prototypical Implementation
- Extending Results to Grid and Cloud Computing
- Control code
- SPR820020526
- Dimensions
- unknown
- Extent
- 1 online resource.
- File format
- unknown
- Form of item
- online
- Isbn
- 9783834826176
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Quality assurance targets
- not applicable
- Record ID
- b3871254
- Reformatting quality
- unknown
- Reproduction note
- Electronic resource.
- Sound
- unknown sound
- Specific material designation
- remote
Context
Context of Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/IWXuIzqrcd0/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/IWXuIzqrcd0/">Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/IWXuIzqrcd0/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/IWXuIzqrcd0/">Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Klaus-Peter Fischer-Hellmann, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>