Information Flow Based Security Control Beyond RBAC: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC): IT im Unternehmen, cartea 1
Autor Klaus-Peter Fischer-Hellmann Editat de Rainer Bischoffen Limba Engleză Paperback – 2 noi 2012
Preț: 321.35 lei
Preț vechi: 401.69 lei
-20% Nou
Puncte Express: 482
Preț estimativ în valută:
61.50€ • 63.88$ • 51.08£
61.50€ • 63.88$ • 51.08£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783834826176
ISBN-10: 3834826170
Pagini: 184
Ilustrații: XXI, 161 p. 25 illus.
Dimensiuni: 168 x 240 x 15 mm
Greutate: 0.3 kg
Ediția:2012
Editura: Springer Fachmedien Wiesbaden
Colecția Springer Vieweg
Seria IT im Unternehmen
Locul publicării:Wiesbaden, Germany
ISBN-10: 3834826170
Pagini: 184
Ilustrații: XXI, 161 p. 25 illus.
Dimensiuni: 168 x 240 x 15 mm
Greutate: 0.3 kg
Ediția:2012
Editura: Springer Fachmedien Wiesbaden
Colecția Springer Vieweg
Seria IT im Unternehmen
Locul publicării:Wiesbaden, Germany
Public țintă
Professional/practitionerCuprins
Cross-Organisational Deployment of Business Processes.- Approaches to Specification and Enforcement of Security Policies.- Analysis of Security-Relevant Semantics of BPEL.- Security Policy Compliance Assessment for BPEL-Defined Processes.- Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows.
Notă biografică
Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level.
Textul de pe ultima copertă
The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing.Contents
Cross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows
Target Groups
IT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs);
Security Policy and Quality Assurance Officers and Managers;
Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers;
Interested Learners/Students in the Field of Security Management
The Author
Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level.
Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly intelecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level.
The Series "IT im Unternehmen" is edited by Prof. Dr. Rainer Bischoff.
Cross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows
Target Groups
IT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs);
Security Policy and Quality Assurance Officers and Managers;
Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers;
Interested Learners/Students in the Field of Security Management
The Author
Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level.
Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly intelecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level.
The Series "IT im Unternehmen" is edited by Prof. Dr. Rainer Bischoff.
Caracteristici
Comprehensible for experts in the field as well as other readers Providing modern methods of information flow control Easy-to-apply and proven methods Includes supplementary material: sn.pub/extras Includes supplementary material: sn.pub/extras