Architectural Alignment of Access Control Requirements Extracted from Business Processes / / Roman Pilipchuk.
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of trans...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Karlsruhe, Germany : : KIT Scientific Publishing,, 2023. |
Year of Publication: | 2023 |
Language: | English |
Physical Description: | 1 online resource (329 pages) :; illustrations |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 01706nam a2200313 i 4500 | ||
---|---|---|---|
001 | 993599243204498 | ||
005 | 20230510061642.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 230510s2023 gw a o 000 0 eng d | ||
035 | |a (CKB)5860000000297471 | ||
035 | |a (NjHacI)995860000000297471 | ||
035 | |a (EXLCZ)995860000000297471 | ||
040 | |a NjHacI |b eng |e rda |c NjHacl | ||
050 | 4 | |a QA76.9.A25 |b .P555 2023 | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Pilipchuk, Roman, |e author. | |
245 | 1 | 0 | |a Architectural Alignment of Access Control Requirements Extracted from Business Processes / |c Roman Pilipchuk. |
264 | 1 | |a Karlsruhe, Germany : |b KIT Scientific Publishing, |c 2023. | |
300 | |a 1 online resource (329 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | |a Description based on publisher supplied metadata and other sources. | ||
520 | |a Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a. access permissions for role-based access control and b. architectural data flow constraints to identify violations of access control in enterprise application architectures. | ||
505 | 0 | |a Introduction -- Foundations -- Approach -- Process for Utilizing Approaches in Organizations -- Validation -- Related Work -- Conclusion. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Software engineering. | |
650 | 0 | |a Enterprise application integration (Computer systems) | |
776 | |z 1000148100 | ||
906 | |a BOOK | ||
ADM | |b 2023-05-24 05:31:30 Europe/Vienna |f System |c marc21 |a 2023-02-11 21:29:23 Europe/Vienna |g false | ||
AVE | |i DOAB Directory of Open Access Books |P DOAB Directory of Open Access Books |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5345651170004498&Force_direct=true |Z 5345651170004498 |b Available |8 5345651170004498 |