Breaking News!
Up to 30% Off Nike Footwear

Information Flow Based Security Control Beyond RBAC

Best Price (Coupon Required):
Buy Information Flow Based Security Control Beyond RBAC for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783834826176
Condition
New
Product Description

Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance with restrictions implied by security policies, in particular, to prevent disclosure of information or access to resources beyond restrictions defined by those security policies. Since RBAC only provides the alternatives of either granting or denying access, more fine-grained control of information flows such as granting access to information provided that it will not be disclosed to targets outside our organisation during further processing is not possible. In business processes, in particular those spanning several organisations, which are commonly defined using business process execution language (BPEL), useful information flows not violating security policy-implied limitations would be prevented if only the access control capabilities offered by RBAC are in use. The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of Grid services or Cloud services. IT Security Specialists Chief Information Officers (CIOs) Chief Security Officers (CSOs) Security Policy and Quality Assurance Officers and Managers Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers Interested Learners / Students in the Field of Security Management.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Unknown Values and Stakeholders

Unknown Values and Stakeholders

$129.99
Integrated Solid Waste Management: A Lifecycle Inventory

Integrated Solid Waste Management: A Lifecycle Inventory

$79.99
Materials and Processes for Solar Fuel Production

Materials and Processes for Solar Fuel Production

$84.99
Lights in the Sky

Lights in the Sky

$27.99
Clinical Tests of Gastric Secretion

Clinical Tests of Gastric Secretion

$29.99
Inductive Logic Programming

Inductive Logic Programming

$39.99
High Performance Computing - HiPC 2001

High Performance Computing - HiPC 2001

$39.99
Data Analysis in Astronomy IV

Data Analysis in Astronomy IV

$39.99
Current Research in Sports Sciences

Current Research in Sports Sciences

$169.99
Horace and Housman

Horace and Housman

$39.99
bertragung einer Kapitalgesellschaft auf die nchste Generation

bertragung einer Kapitalgesellschaft auf die nchste Generation

$64.99
Das Glck des Traurigseins

Das Glck des Traurigseins

$29.99
Bridging between Research and Practice

Bridging between Research and Practice

$49.99
Myths, Politicians and Money

Myths, Politicians and Money

$42.00
Qualitt von PPS-Systemen

Qualitt von PPS-Systemen

$69.99
The South at the End of the Twentieth Century

The South at the End of the Twentieth Century

$109.99
Fundamentals of Mass Determination

Fundamentals of Mass Determination

$54.99
Tourism in Antarctica

Tourism in Antarctica

$54.99
Palgrave Advances in International History

Palgrave Advances in International History

$54.99
Graph Theory

Graph Theory

$89.99
Stahlmaste fr Starkstrom-Freileitungen

Stahlmaste fr Starkstrom-Freileitungen

$54.99
Uniform Random Numbers

Uniform Random Numbers

$169.00
Ruptures: Anti-colonial & Anti-racist Feminist Theorizing

Ruptures: Anti-colonial & Anti-racist Feminist Theorizing

$49.99
Poland in the Second World War

Poland in the Second World War

$84.99
The Interaction of Compilation Technology and Computer Architecture

The Interaction of Compilation Technology and Computer Architecture

$84.99
Begriffswelt der Feldtheorie

Begriffswelt der Feldtheorie

$79.99
Business Process Automation

Business Process Automation

$54.99
Political Communication in Sub-Saharan Africa, Volume I

Political Communication in Sub-Saharan Africa, Volume I

$129.99
Medien und Emotionen

Medien und Emotionen

$59.99
Unearthing the Real Process Behind the Event Data

Unearthing the Real Process Behind the Event Data

$54.99
Multimobile Development

Multimobile Development

$54.99
Linguistische Einheiten im Rahmen der modernen Sprachwissenschaft

Linguistische Einheiten im Rahmen der modernen Sprachwissenschaft

$44.99
Physicochemical Hydrodynamics

Physicochemical Hydrodynamics

$39.99
Engineering Geology for Society and Territory - Volume 5

Engineering Geology for Society and Territory - Volume 5

$509.00
Transactions on Petri Nets and Other Models of Concurrency VI

Transactions on Petri Nets and Other Models of Concurrency VI

$54.99
Foodborne Bacterial Pathogens

Foodborne Bacterial Pathogens

$179.99
mRNA Processing

mRNA Processing

$179.99
Organometallics in Process Chemistry

Organometallics in Process Chemistry

$329.99
Multimedia im Netz

Multimedia im Netz

$69.99
Computational Seismology

Computational Seismology

$39.99
previous
next