Abstract
In the former chapters, the ideas constituting the approach presented here have been developed and described in detail. In particular, the definition of SPS to facilitate the process of compliance assessment was explained and the procedure of checking a BPEL script for its compliance with local security policies has been outlined. In order to provide an effective and efficient method for security policy enforcement in the context of business process execution, particularly in scenarios where the corresponding BPEL scripts defining the processes have been defined remotely from the location of their execution, the procedure of compliance assessment should preferably be capable of being performed automatically (at least major parts thereof).
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Fischer-Hellmann, KP. (2012). Proof of Concept by Prototypical Implementation. In: Bischoff, R. (eds) Information Flow Based Security Control Beyond RBAC. IT im Unternehmen, vol 1. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-8348-2618-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-8348-2618-3_7
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-8348-2617-6
Online ISBN: 978-3-8348-2618-3
eBook Packages: Computer ScienceComputer Science (R0)