Skip to main content
  • Book
  • © 2012

Information Flow Based Security Control Beyond RBAC

How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

Editors:

  • Comprehensible for experts in the field as well as other readers
  • Providing modern methods of information flow control
  • Easy-to-apply and proven methods
  • Includes supplementary material: sn.pub/extras
  • Includes supplementary material: sn.pub/extras

Part of the book series: IT im Unternehmen (ITU, volume 1)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (11 chapters)

  1. Front Matter

    Pages 1-1
  2. Introduction

    • Klaus-Peter Fischer-Hellmann
    Pages 1-6
  3. Cross-Organisational Deployment of Business Processes

    • Klaus-Peter Fischer-Hellmann
    Pages 7-18
  4. Approaches to Specification and Enforcement of Security Policies

    • Klaus-Peter Fischer-Hellmann
    Pages 19-38
  5. Analysis of Security-Relevant Semantics of BPEL

    • Klaus-Peter Fischer-Hellmann
    Pages 39-65
  6. Security Policy Compliance Assessment for BPEL Scripts

    • Klaus-Peter Fischer-Hellmann
    Pages 81-92
  7. Proof of Concept by Prototypical Implementation

    • Klaus-Peter Fischer-Hellmann
    Pages 93-112
  8. Extending Results to Grid and Cloud Computing

    • Klaus-Peter Fischer-Hellmann
    Pages 113-132
  9. Conclusions and Directions of Further Research and Development

    • Klaus-Peter Fischer-Hellmann
    Pages 133-140
  10. XML Schema for Security Policy Statement

    • Klaus-Peter Fischer-Hellmann
    Pages 141-144
  11. Back Matter

    Pages 13-13

About this book

Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance with restrictions implied by security policies, in particular, to prevent disclosure of information or access to resources beyond restrictions defined by those security policies. Since RBAC only provides the alternatives of either granting or denying access, more fine-grained control of information flows such as “granting access to information provided that it will not be disclosed to targets outside our organisation during further processing” is not possible. In business processes, in particular those spanning several organisations, which are commonly defined using business process execution language (BPEL), useful information flows not violating security policy-implied limitations would be prevented if only the access control capabilities offered by RBAC are in use. The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of Grid services or Cloud services. IT Security Specialists Chief Information Officers (CIOs) Chief Security Officers (CSOs) Security Policy and Quality Assurance Officers and Managers Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers Interested Learners / Students in the Field of Security Management.

Authors, Editors and Affiliations

  • Furtwangen, Germany

    Rainer Bischoff

  • Digamma Communications Consulting GmbH, Mühltal, Germany

    Klaus-Peter Fischer-Hellmann

About the editor

Klaus-Peter Fischer-Hellmann has received his PhD in Computer Science from the University of Plymouth (UK) and holds an MSc in Mathematics from the University of Heidelberg. His expertise is based on more than 30 years of experience in the field of distributed applications, particularly in telecommunications. For several years now, he has been actively involved in teaching and supervising post-graduate research students at PhD level.

Bibliographic Information

  • Book Title: Information Flow Based Security Control Beyond RBAC

  • Book Subtitle: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

  • Authors: Klaus-Peter Fischer-Hellmann

  • Editors: Rainer Bischoff

  • Series Title: IT im Unternehmen

  • DOI: https://doi.org/10.1007/978-3-8348-2618-3

  • Publisher: Springer Vieweg Wiesbaden

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden 2012

  • Softcover ISBN: 978-3-8348-2617-6Published: 02 November 2012

  • eBook ISBN: 978-3-8348-2618-3Published: 02 November 2012

  • Series ISSN: 2522-0608

  • Series E-ISSN: 2522-0616

  • Edition Number: 1

  • Number of Pages: XXI, 161

  • Number of Illustrations: 25 b/w illustrations

  • Topics: Systems and Data Security, Data Structures, Coding and Information Theory

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access