Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures
Prominent services in the operational portfolio of enterprise information systems are facilities des...
Since the value of information is constantly growing more and more businesses are in need for inform...
Integrated process support is highly desirable in environ- ments where data related to a particular ...
The last couple of decades saw lots of changes in the business world. Not only did technology change...
Defining an Access Control Service for an enterprise application requires the choice of an access co...
Role-based access control (RBAC) is used for managing authorisation in IT systems, by utilising the ...
Business process management is designed to make business activity coordination easier and more cost ...
Abstract. This paper focuses on problems of access control for business processes. The subject of th...
vices are the new paradigms for the lightweight integration of business from different enterprises. ...
International audienceApplying separation of concerns approaches into business process context gener...
The paper focuses on role engineering which is an important topic in the development of access contr...
La sécurité des systèmes d'information devient un enjeu préoccupant pour les organisations tant publ...
Access control is a common concern in most software applications. In component-based systems, althou...
Business Processes for Web Services are the new paradigm for the lightweight integration of business...
the new paradigms for the lightweight integration of business from different enterprises. Whereas th...
Prominent services in the operational portfolio of enterprise information systems are facilities des...
Since the value of information is constantly growing more and more businesses are in need for inform...
Integrated process support is highly desirable in environ- ments where data related to a particular ...
The last couple of decades saw lots of changes in the business world. Not only did technology change...
Defining an Access Control Service for an enterprise application requires the choice of an access co...
Role-based access control (RBAC) is used for managing authorisation in IT systems, by utilising the ...
Business process management is designed to make business activity coordination easier and more cost ...
Abstract. This paper focuses on problems of access control for business processes. The subject of th...
vices are the new paradigms for the lightweight integration of business from different enterprises. ...
International audienceApplying separation of concerns approaches into business process context gener...
The paper focuses on role engineering which is an important topic in the development of access contr...
La sécurité des systèmes d'information devient un enjeu préoccupant pour les organisations tant publ...
Access control is a common concern in most software applications. In component-based systems, althou...
Business Processes for Web Services are the new paradigm for the lightweight integration of business...
the new paradigms for the lightweight integration of business from different enterprises. Whereas th...
Prominent services in the operational portfolio of enterprise information systems are facilities des...
Since the value of information is constantly growing more and more businesses are in need for inform...
Integrated process support is highly desirable in environ- ments where data related to a particular ...