Skip to main content

Approaches to Specification and Enforcement of Security Policies

  • Chapter
Information Flow Based Security Control Beyond RBAC

Part of the book series: IT im Unternehmen ((ITU,volume 1))

  • 509 Accesses

Abstract

In SOA-Security-Kompendium, a variety of security aspects to be observed with SOA based on Web services and ways to cope with them is described. Approaches to cope with security policy enforcement in general, and of Web services and business processes, in particular, being only part of what is contained there, will be discussed in this chapter. Possible methods include validation (or even verification) prior to execution, or by monitoring and intervening during execution of a program. In addition, because a BPEL-defined business process can itself be considered a Web service, approaches to specify security requirements of Web services and to solve security issues with Web services may also relate to business processes defined this way and, therefore, will be considered in this chapter, too.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Fischer-Hellmann, KP. (2012). Approaches to Specification and Enforcement of Security Policies. In: Bischoff, R. (eds) Information Flow Based Security Control Beyond RBAC. IT im Unternehmen, vol 1. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-8348-2618-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-2618-3_3

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-8348-2617-6

  • Online ISBN: 978-3-8348-2618-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics