Architectural Alignment of Access Control Requirements Extracted from Business Processes
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of trans...
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
KIT Scientific Publishing
2023
|
Series: | The Karlsruhe Series on Software Design and Quality
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_97732 | ||
005 | 20230303 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20230303s2023 xx |||||o ||| 0|eng d | ||
020 | |a KSP/1000148100 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5445/KSP/1000148100 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UYAM |2 bicssc | |
100 | 1 | |a Pilipchuk, Roman |4 auth | |
245 | 1 | 0 | |a Architectural Alignment of Access Control Requirements Extracted from Business Processes |
260 | |b KIT Scientific Publishing |c 2023 | ||
300 | |a 1 electronic resource (366 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a The Karlsruhe Series on Software Design and Quality | |
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-sa/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-sa/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Maths for computer scientists |2 bicssc | |
653 | |a Software Engineering; Enterprise Architecture; Zugriffskontrolle; Geschäftsprozesse; Access Control; Business Processes | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/20.500.12657/61238/1/architectural-alignment-of-access-control-requirements-extracted-from-business-processes.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/97732 |7 0 |z DOAB: description of the publication |