Narrow your search

Library

KU Leuven (1)

National Bank of Belgium (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

UGent (1)

ULB (1)

ULiège (1)

Vlerick Business School (1)

More...

Resource type

book (2)


Language

English (2)


Year
From To Submit

2012 (2)

Listing 1 - 2 of 2
Sort by

Book
Oracle BPM Suite 11g developer's cookbook : over 80 advanced recipes to develop rich, interactive business processes using the Oracle Business Process Management Suite
Author:
ISBN: 1280394307 9786613572226 1849684235 9781849684231 1849684227 Year: 2012 Publisher: Olton, Birmingham [England] : Packt Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is written in simple, easy to understand format with lots of screenshots and step-by-step explanations. If you are a BPM developer, looking to develop robust BPM solutions without impediments, then this is the best guide for you. This book assumes that you have a fundamental knowledge of BPM.


Book
Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
Author:
ISBN: 3834826170 3834826189 1283908220 Year: 2012 Publisher: Wiesbaden : Springer Vieweg,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing.Contents Cross-Organisational Deployment of Business Processes - Approaches to Specification and Enforcement of Security Policies - Analysis of Security-Relevant Semantics of BPEL - Security Policy Compliance Assessment for BPEL-Defined Processes - Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows Target Groups IT Security Specialists; Chief Information Officers (CIOs); Chief Security Officers (CSOs); Security Policy and Quality Assurance Officers and Managers; Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers; Interested Learners/Students in the Field of Security Management The Author Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level. The Series "IT im Unternehmen" is edited by Prof. Dr. Rainer Bischoff.

Keywords

Database management -- Access control. --- Engineering & Applied Sciences --- Computer Science --- Computer networks --- Flow control (Data transmission systems) --- BPEL (Computer program language) --- Management information systems. --- Access control. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- BPEL4WS (Computer program language) --- BPELWS (Computer program language) --- Business Process Execution Language (Computer program language) --- Business Process Execution Language for Web Services (Computer program language) --- WS-BPEL (Computer program language) --- Control of data flow --- Computer science. --- Computer security. --- Data structures (Computer science). --- Coding theory. --- Computer Science. --- Systems and Data Security. --- Data Structures. --- Coding and Information Theory. --- Sociotechnical systems --- Information resources management --- Management --- Programming languages (Electronic computers) --- Automatic control --- Data transmission systems --- Communication systems --- Data structures (Computer scienc. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science)

Listing 1 - 2 of 2
Sort by