Architectural Alignment of Access Control Requirements Extracted from Business Processes / / Roman Pilipchuk.

Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of trans...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Karlsruhe, Germany : : KIT Scientific Publishing,, 2023.
Year of Publication:2023
Language:English
Physical Description:1 online resource (329 pages) :; illustrations
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01706nam a2200313 i 4500
001 993661542004498
005 20230510061642.0
006 m o d
007 cr |||||||||||
008 230510s2023 gw a o 000 0 eng d
035 |a (CKB)5860000000297471 
035 |a (NjHacI)995860000000297471 
035 |a (EXLCZ)995860000000297471 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
050 4 |a QA76.9.A25  |b .P555 2023 
082 0 4 |a 005.8  |2 23 
100 1 |a Pilipchuk, Roman,  |e author. 
245 1 0 |a Architectural Alignment of Access Control Requirements Extracted from Business Processes /  |c Roman Pilipchuk. 
264 1 |a Karlsruhe, Germany :  |b KIT Scientific Publishing,  |c 2023. 
300 |a 1 online resource (329 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on publisher supplied metadata and other sources. 
520 |a Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a. access permissions for role-based access control and b. architectural data flow constraints to identify violations of access control in enterprise application architectures. 
505 0 |a Introduction -- Foundations -- Approach -- Process for Utilizing Approaches in Organizations -- Validation -- Related Work -- Conclusion. 
650 0 |a Computer security. 
650 0 |a Software engineering. 
650 0 |a Enterprise application integration (Computer systems) 
776 |z 1000148100 
906 |a BOOK 
ADM |b 2024-04-24 03:25:05 Europe/Vienna  |f System  |c marc21  |a 2023-02-11 21:29:23 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5354322210004498&Force_direct=true  |Z 5354322210004498  |b Available  |8 5354322210004498