Architectural Alignment of Access Control Requirements Extracted from Business Processes / / Roman Pilipchuk.
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of trans...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Karlsruhe, Germany : : KIT Scientific Publishing,, 2023. |
Year of Publication: | 2023 |
Language: | English |
Physical Description: | 1 online resource (329 pages) :; illustrations |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993661542004498 |
---|---|
ctrlnum |
(CKB)5860000000297471 (NjHacI)995860000000297471 (EXLCZ)995860000000297471 |
collection |
bib_alma |
record_format |
marc |
spelling |
Pilipchuk, Roman, author. Architectural Alignment of Access Control Requirements Extracted from Business Processes / Roman Pilipchuk. Karlsruhe, Germany : KIT Scientific Publishing, 2023. 1 online resource (329 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on publisher supplied metadata and other sources. Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a. access permissions for role-based access control and b. architectural data flow constraints to identify violations of access control in enterprise application architectures. Introduction -- Foundations -- Approach -- Process for Utilizing Approaches in Organizations -- Validation -- Related Work -- Conclusion. Computer security. Software engineering. Enterprise application integration (Computer systems) 1000148100 |
language |
English |
format |
eBook |
author |
Pilipchuk, Roman, |
spellingShingle |
Pilipchuk, Roman, Architectural Alignment of Access Control Requirements Extracted from Business Processes / Introduction -- Foundations -- Approach -- Process for Utilizing Approaches in Organizations -- Validation -- Related Work -- Conclusion. |
author_facet |
Pilipchuk, Roman, |
author_variant |
r p rp |
author_role |
VerfasserIn |
author_sort |
Pilipchuk, Roman, |
title |
Architectural Alignment of Access Control Requirements Extracted from Business Processes / |
title_full |
Architectural Alignment of Access Control Requirements Extracted from Business Processes / Roman Pilipchuk. |
title_fullStr |
Architectural Alignment of Access Control Requirements Extracted from Business Processes / Roman Pilipchuk. |
title_full_unstemmed |
Architectural Alignment of Access Control Requirements Extracted from Business Processes / Roman Pilipchuk. |
title_auth |
Architectural Alignment of Access Control Requirements Extracted from Business Processes / |
title_new |
Architectural Alignment of Access Control Requirements Extracted from Business Processes / |
title_sort |
architectural alignment of access control requirements extracted from business processes / |
publisher |
KIT Scientific Publishing, |
publishDate |
2023 |
physical |
1 online resource (329 pages) : illustrations |
contents |
Introduction -- Foundations -- Approach -- Process for Utilizing Approaches in Organizations -- Validation -- Related Work -- Conclusion. |
isbn |
1000148100 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 P555 42023 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
work_keys_str_mv |
AT pilipchukroman architecturalalignmentofaccesscontrolrequirementsextractedfrombusinessprocesses |
status_str |
n |
ids_txt_mv |
(CKB)5860000000297471 (NjHacI)995860000000297471 (EXLCZ)995860000000297471 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Architectural Alignment of Access Control Requirements Extracted from Business Processes / |
_version_ |
1797653673798533123 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01706nam a2200313 i 4500</leader><controlfield tag="001">993661542004498</controlfield><controlfield tag="005">20230510061642.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230510s2023 gw a o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5860000000297471</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995860000000297471</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995860000000297471</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.P555 2023</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pilipchuk, Roman,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Architectural Alignment of Access Control Requirements Extracted from Business Processes /</subfield><subfield code="c">Roman Pilipchuk.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Karlsruhe, Germany :</subfield><subfield code="b">KIT Scientific Publishing,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (329 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a. access permissions for role-based access control and b. architectural data flow constraints to identify violations of access control in enterprise application architectures.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- Foundations -- Approach -- Process for Utilizing Approaches in Organizations -- Validation -- Related Work -- Conclusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software engineering.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Enterprise application integration (Computer systems)</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1000148100</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-04-24 03:25:05 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2023-02-11 21:29:23 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5354322210004498&Force_direct=true</subfield><subfield code="Z">5354322210004498</subfield><subfield code="b">Available</subfield><subfield code="8">5354322210004498</subfield></datafield></record></collection> |