Book Volume 1 2012

Information Flow Based Security Control Beyond RBAC

How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)



ISBN: 978-3-8348-2617-6 (Print) 978-3-8348-2618-3 (Online)

Table of contents (11 chapters)

  1. Front Matter

    Pages 1-1

  2. Chapter

    Pages 1-6


  3. Chapter

    Pages 7-18

    Cross-Organisational Deployment of Business Processes

  4. Chapter

    Pages 19-38

    Approaches to Specification and Enforcement of Security Policies

  5. Chapter

    Pages 39-65

    Analysis of Security-Relevant Semantics of BPEL

  6. Chapter

    Pages 67-80

    Specification of Security Policy for Compliance Assessment of CBPs

  7. Chapter

    Pages 81-92

    Security Policy Compliance Assessment for BPEL Scripts

  8. Chapter

    Pages 93-112

    Proof of Concept by Prototypical Implementation

  9. Chapter

    Pages 113-132

    Extending Results to Grid and Cloud Computing

  10. Chapter

    Pages 133-140

    Conclusions and Directions of Further Research and Development

  11. Chapter

    Pages 141-144

    XML Schema for Security Policy Statement

  12. Chapter

    Pages 146-146

    Outline of Sophisticated Covert Channel Prevention for Activity validate

  13. Back Matter

    Pages 13-13