UID:
edoccha_9961003985702883
Format:
1 online resource (329 pages) :
,
illustrations
Content:
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a. access permissions for role-based access control and b. architectural data flow constraints to identify violations of access control in enterprise application architectures.
Note:
Introduction -- Foundations -- Approach -- Process for Utilizing Approaches in Organizations -- Validation -- Related Work -- Conclusion.
Additional Edition:
ISBN 1000148100
Language:
English