Feedback

X
Architectural Alignment of Access Control Requirements Extracted from Business Processes

Architectural Alignment of Access Control Requirements Extracted from Business Processes

en

0 Ungluers have Faved this Work
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 25 times via unglue.it ebook links.
  1. 25 - pdf (CC BY-SA) at Unglue.it.

Keywords

  • Access control
  • business processes
  • Computer science
  • Computing & information technology
  • Enterprise Architecture
  • Geschäftsprozesse
  • Mathematical theory of computation
  • Maths for computer scientists
  • Software engineering
  • thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists
  • Zugriffskontrolle

Links

DOI: 10.5445/KSP/1000148100

Editions

edition cover

Share

Copy/paste this into your site: