architectural-alignment-of-access-control-requirements-extracted-from-business-processes.pdf

Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of trans...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Γλώσσα:English
Έκδοση: KIT Scientific Publishing 2023
Διαθέσιμο Online:https://doi.org/10.5445/KSP/1000148100
id oapen-20.500.12657-61238
record_format dspace
spelling oapen-20.500.12657-612382024-03-27T14:14:27Z Architectural Alignment of Access Control Requirements Extracted from Business Processes Pilipchuk, Roman Software Engineering; Enterprise Architecture; Zugriffskontrolle; Geschäftsprozesse; Access Control; Business Processes thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures. 2023-02-13T14:10:02Z 2023-02-13T14:10:02Z 2023 book https://library.oapen.org/handle/20.500.12657/61238 eng The Karlsruhe Series on Software Design and Quality application/pdf Attribution-ShareAlike 4.0 International architectural-alignment-of-access-control-requirements-extracted-from-business-processes.pdf https://doi.org/10.5445/KSP/1000148100 KIT Scientific Publishing 10.5445/KSP/1000148100 10.5445/KSP/1000148100 44e29711-8d53-496b-85cc-3d10c9469be9 37 366 open access
institution OAPEN
collection DSpace
language English
description Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.
title architectural-alignment-of-access-control-requirements-extracted-from-business-processes.pdf
spellingShingle architectural-alignment-of-access-control-requirements-extracted-from-business-processes.pdf
title_short architectural-alignment-of-access-control-requirements-extracted-from-business-processes.pdf
title_full architectural-alignment-of-access-control-requirements-extracted-from-business-processes.pdf
title_fullStr architectural-alignment-of-access-control-requirements-extracted-from-business-processes.pdf
title_full_unstemmed architectural-alignment-of-access-control-requirements-extracted-from-business-processes.pdf
title_sort architectural-alignment-of-access-control-requirements-extracted-from-business-processes.pdf
publisher KIT Scientific Publishing
publishDate 2023
url https://doi.org/10.5445/KSP/1000148100
_version_ 1799945239943708672