Abstract
In this chapter, the results achieved in the field of business processes are investigated with respect to their transferability to other fields where comparable circumstances prevail. The chapter has been included in this book to demonstrate that the techniques developed in the previous chapters for the CBP context can be generalised to also be applicable in related fields. Showing their applicability in a wider context is deemed to further the validity of the approach presented.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Fischer-Hellmann, KP. (2012). Extending Results to Grid and Cloud Computing. In: Bischoff, R. (eds) Information Flow Based Security Control Beyond RBAC. IT im Unternehmen, vol 1. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-8348-2618-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-8348-2618-3_8
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-8348-2617-6
Online ISBN: 978-3-8348-2618-3
eBook Packages: Computer ScienceComputer Science (R0)