Volume 1 2012

Information Flow Based Security Control Beyond RBAC

How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

Authors:

Editors:

ISBN: 978-3-8348-2617-6 (Print) 978-3-8348-2618-3 (Online)

Table of contents (11 chapters)

  1. Front Matter

    Pages 1-1

  2. No Access

    Book Chapter

    Pages 1-6

    Introduction

  3. No Access

    Book Chapter

    Pages 7-18

    Cross-Organisational Deployment of Business Processes

  4. No Access

    Book Chapter

    Pages 19-38

    Approaches to Specification and Enforcement of Security Policies

  5. No Access

    Book Chapter

    Pages 39-65

    Analysis of Security-Relevant Semantics of BPEL

  6. No Access

    Book Chapter

    Pages 67-80

    Specification of Security Policy for Compliance Assessment of CBPs

  7. No Access

    Book Chapter

    Pages 81-92

    Security Policy Compliance Assessment for BPEL Scripts

  8. No Access

    Book Chapter

    Pages 93-112

    Proof of Concept by Prototypical Implementation

  9. No Access

    Book Chapter

    Pages 113-132

    Extending Results to Grid and Cloud Computing

  10. No Access

    Book Chapter

    Pages 133-140

    Conclusions and Directions of Further Research and Development

  11. No Access

    Book Chapter

    Pages 141-144

    XML Schema for Security Policy Statement

  12. No Access

    Book Chapter

    Pages 146-146

    Outline of Sophisticated Covert Channel Prevention for Activity validate

  13. Back Matter

    Pages 13-13