Information flow based security control beyond RBAC how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
Format: | Book Thesis |
---|---|
Terbitan: |
Spinger-Verlag
, 2012
|
Subjects: | |
Online Access: |
http://lib.ui.ac.id/file?file=digital/2015-8/20406903-Information Flow Based Security Control Beyond RBAC.pdf |
ctrlnum |
20406903 |
---|---|
fullrecord |
<?xml version="1.0"?>
<dc schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><title>Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)</title><creator/><type>Book:Book</type><place>Dordrecht, Netherlands</place><publisher>Spinger-Verlag</publisher><date>2012</date><description>The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of grid services or cloud services.</description><subject>Computer networks -- Access control</subject><subject>Flow control (data transmission systems)</subject><subject>BPEL (computer program language)</subject><identifier>20406903</identifier><source>http://lib.ui.ac.id/file?file=digital/2015-8/20406903-Information Flow Based Security Control Beyond RBAC.pdf</source><recordID>20406903</recordID></dc>
|
format |
Book:Book Book Thesis:Thesis Thesis |
title |
Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) |
title_sub |
how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) |
publisher |
Spinger-Verlag |
publishDate |
2012 |
topic |
Computer networks -- Access control Flow control (data transmission systems) BPEL (computer program language) |
url |
http://lib.ui.ac.id/file?file=digital/2015-8/20406903-Information Flow Based Security Control Beyond RBAC.pdf |
contents |
The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of grid services or cloud services. |
id |
IOS18066.20406903 |
institution |
Universitas Indonesia |
institution_id |
51 |
institution_type |
library:university library |
library |
Perpustakaan Universitas Indonesia |
library_id |
492 |
collection |
contoh Repository Tesis (Open) Universitas Indonesia |
repository_id |
18066 |
city |
KOTA DEPOK |
province |
JAWA BARAT |
repoId |
IOS18066 |
first_indexed |
2022-12-14T02:35:06Z |
last_indexed |
2022-12-14T02:35:06Z |
recordtype |
dc |
merged_child_boolean |
1 |
_version_ |
1752199114553032704 |
score |
17.538404 |