000 | 04229nam a22003855i 4500 | ||
---|---|---|---|
001 | 308902 | ||
003 | MX-SnUAN | ||
005 | 20160429160235.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2012 gw | o |||| 0|eng d | ||
020 |
_a9783834826183 _99783834826183 |
||
024 | 7 |
_a10.1007/9783834826183 _2doi |
|
035 | _avtls000363305 | ||
039 | 9 |
_a201509030636 _bVLOAD _c201405070342 _dVLOAD _y201402211143 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.A25 | |
100 | 1 |
_aFischer-Hellmann, Klaus-Peter. _eautor _9348963 |
|
245 | 1 | 0 |
_aInformation Flow Based Security Control Beyond RBAC : _bHow to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) / _cby Klaus-Peter Fischer-Hellmann ; edited by Rainer Bischoff. |
264 | 1 |
_aWiesbaden : _bSpringer Fachmedien Wiesbaden : _bImprint: Springer Vieweg, _c2012. |
|
300 |
_axxI, 161 páginas 25 ilustraciones _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aIT im Unternehmen ; _v1 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aCross-Organisational Deployment of Business Processes.- Approaches to Specification and Enforcement of Security Policies -- Analysis of Security-Relevant Semantics of BPEL -- Security Policy Compliance Assessment for BPEL-Defined Processes -- Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows. | |
520 | _aThe book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing.Contents Cross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows Target Groups IT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs); Security Policy and Quality Assurance Officers and Managers; Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers; Interested Learners/Students in the Field of Security Management The Author Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. The Series "IT im Unternehmen" is edited by Prof. Dr. Rainer Bischoff. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aBischoff, Rainer. _eeditor. _9342931 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783834826176 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-8348-2618-3 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c308902 _d308902 |