Information Flow Based Security Control Beyond RBAC

Information Flow Based Security Control Beyond RBAC
Author :
Publisher : Springer Science & Business Media
Total Pages : 178
Release :
ISBN-10 : 9783834826183
ISBN-13 : 3834826189
Rating : 4/5 (189 Downloads)

Book Synopsis Information Flow Based Security Control Beyond RBAC by : Klaus-Peter Fischer-Hellmann

Download or read book Information Flow Based Security Control Beyond RBAC written by Klaus-Peter Fischer-Hellmann and published by Springer Science & Business Media. This book was released on 2012-11-02 with total page 178 pages. Available in PDF, EPUB and Kindle. Book excerpt: Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance with restrictions implied by security policies, in particular, to prevent disclosure of information or access to resources beyond restrictions defined by those security policies. Since RBAC only provides the alternatives of either granting or denying access, more fine-grained control of information flows such as “granting access to information provided that it will not be disclosed to targets outside our organisation during further processing” is not possible. In business processes, in particular those spanning several organisations, which are commonly defined using business process execution language (BPEL), useful information flows not violating security policy-implied limitations would be prevented if only the access control capabilities offered by RBAC are in use. The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of Grid services or Cloud services. IT Security Specialists Chief Information Officers (CIOs) Chief Security Officers (CSOs) Security Policy and Quality Assurance Officers and Managers Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers Interested Learners / Students in the Field of Security Management.


Information Flow Based Security Control Beyond RBAC Related Books

Information Flow Based Security Control Beyond RBAC
Language: en
Pages: 178
Authors: Klaus-Peter Fischer-Hellmann
Categories: Computers
Type: BOOK - Published: 2012-11-02 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance
Advances in Computer Science - ASIAN 2007. Computer and Network Security
Language: en
Pages: 323
Authors: Iliano Cervesato
Categories: Computers
Type: BOOK - Published: 2007-11-17 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 12th Asian Computing Science Conference, ASIAN 2007, held in Doha, Qatar, in December 2007. Covering all c
Information Security Practice and Experience
Language: en
Pages: 403
Authors: Kefei Chen
Categories: Computers
Type: BOOK - Published: 2006-02-26 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou
Algorithms and Architectures for Parallel Processing
Language: en
Pages: 884
Authors: Guojin Wang
Categories: Computers
Type: BOOK - Published: 2015-11-18 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Workshops and Symposiums of the 15th International Conference on Algorithms and Architectures for Parallel
Trust, Privacy and Security in Digital Business
Language: en
Pages: 302
Authors: Costas Lambrinoudakis
Categories: Computers
Type: BOOK - Published: 2007-08-18 - Publisher: Springer

DOWNLOAD EBOOK

This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 papers were all carefully rev