Abstract
In this section, the results of an analysis of BPEL as a specification language will be presented. The purpose of this analysis was to identify the intrinsic potential of BPEL to specify business process behaviour that is able to violate restrictions imposed by security policies. These results form the basis for the methods and procedures for security policy assessment introduced in the next chapter. Readers familiar with syntax and semantics of BPEL as a specification language may skip the overview in Section 4.2.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Fischer-Hellmann, KP. (2012). Analysis of Security-Relevant Semantics of BPEL. In: Bischoff, R. (eds) Information Flow Based Security Control Beyond RBAC. IT im Unternehmen, vol 1. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-8348-2618-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-8348-2618-3_4
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-8348-2617-6
Online ISBN: 978-3-8348-2618-3
eBook Packages: Computer ScienceComputer Science (R0)