Explore
Architectural Alignment of Access Control Requirements Extracted from Business Processes
Roman Pilipchuk
2023
0 Ungluers have
Faved this Work
Login to Fave
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
This work has been downloaded 25 times via unglue.it ebook links.
- 25 - pdf (CC BY-SA) at Unglue.it.
Keywords
- Access control
- business processes
- Computer science
- Computing & information technology
- Enterprise Architecture
- Geschäftsprozesse
- Mathematical theory of computation
- Maths for computer scientists
- Software engineering
- thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists
- Zugriffskontrolle