Information flow based security control beyond RBAC how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

Format: Book Thesis
Terbitan: Spinger-Verlag , 2012
Subjects:
Online Access: http://lib.ui.ac.id/file?file=digital/2015-8/20406903-Information Flow Based Security Control Beyond RBAC.pdf
ctrlnum 20406903
fullrecord <?xml version="1.0"?> <dc schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><title>Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)</title><creator/><type>Book:Book</type><place>Dordrecht, Netherlands</place><publisher>Spinger-Verlag</publisher><date>2012</date><description>The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of grid services or cloud services.</description><subject>Computer networks -- Access control</subject><subject>Flow control (data transmission systems)</subject><subject>BPEL (computer program language)</subject><identifier>20406903</identifier><source>http://lib.ui.ac.id/file?file=digital/2015-8/20406903-Information Flow Based Security Control Beyond RBAC.pdf</source><recordID>20406903</recordID></dc>
format Book:Book
Book
Thesis:Thesis
Thesis
title Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
title_sub how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
publisher Spinger-Verlag
publishDate 2012
topic Computer networks -- Access control
Flow control (data transmission systems)
BPEL (computer program language)
url http://lib.ui.ac.id/file?file=digital/2015-8/20406903-Information Flow Based Security Control Beyond RBAC.pdf
contents The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of grid services or cloud services.
id IOS18066.20406903
institution Universitas Indonesia
institution_id 51
institution_type library:university
library
library Perpustakaan Universitas Indonesia
library_id 492
collection contoh Repository Tesis (Open) Universitas Indonesia
repository_id 18066
city KOTA DEPOK
province JAWA BARAT
repoId IOS18066
first_indexed 2022-12-14T02:35:06Z
last_indexed 2022-12-14T02:35:06Z
recordtype dc
merged_child_boolean 1
_version_ 1752199114553032704
score 17.538404