Transport gratuit la punctele de livrare Pick Up peste 299 lei
Packeta 15 lei Easybox 20 lei Cargus 25 lei FAN 25 lei

Information Flow Based Security Control Beyond RBAC

Limba englezăengleză
Carte Carte broșată
Carte Information Flow Based Security Control Beyond RBAC Klaus-Peter Fischer-Hellmann
Codul Libristo: 01782798
Editura Springer Fachmedien Wiesbaden, noiembrie 2012
Role-based access control (RBAC) is a widely used technology to control information flows as well as... Descrierea completă
? points 163 b
328 lei
șansă 50% Şanse de a obține acest titlu Când primesc cărțile?

30 de zile pentru retur bunuri


Ar putea de asemenea, să te intereseze


Selling Tourism Services at a Distance Josep Maria Bech Serrat / Carte broșată
common.buy 638 lei
Jahrbuch des Arbeitsrechts Ingrid Schmidt / Copertă tare
common.buy 811 lei
curând
Hyrid Derivates Christopher Hunter / Copertă tare
common.buy 502 lei
Bird Day How to prepare for it Charles Almanzo Babcock / Carte broșată
common.buy 130 lei
Glasarchitektur Paul Scheerbart / Carte broșată
common.buy 100 lei
Alexanderbildnis Und Alexandertypus Kurt Gebauer / Carte broșată
common.buy 144 lei

Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance with restrictions implied by security policies, in particular, to prevent disclosure of information or access to resources beyond restrictions defined by those security policies. Since RBAC only provides the alternatives of either granting or denying access, more fine-grained control of information flows such as granting access to information provided that it will not be disclosed to targets outside our organisation during further processing is not possible. In business processes, in particular those spanning several organisations, which are commonly defined using business process execution language (BPEL), useful information flows not violating security policy-implied limitations would be prevented if only the access control capabilities offered by RBAC are in use. The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of Grid services or Cloud services. IT Security Specialists Chief Information Officers (CIOs) Chief Security Officers (CSOs) Security Policy and Quality Assurance Officers and Managers Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers Interested Learners / Students in the Field of Security Management.The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing.Contents§Cross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows§Target Groups§IT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs); §Security Policy and Quality Assurance Officers and Managers;§Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers; §Interested Learners/Students in the Field of Security Management§The AuthorKlaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level.§Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level.

Dăruiește această carte chiar astăzi
Este foarte ușor
1 Adaugă cartea în coș și selectează Livrează ca un cadou 2 Îți vom trimite un voucher în schimb 3 Cartea va ajunge direct la adresa destinatarului

Logare

Conectare la contul de utilizator Încă nu ai un cont Libristo? Crează acum!

 
obligatoriu
obligatoriu

Nu ai un cont? Beneficii cu contul Libristo!

Datorită contului Libristo, vei avea totul sub control.

Creare cont Libristo