00989nam 22003013 450 991013295960332120160621164940.088-491-2201-2(CKB)3400000000017546(ItFiC)it 10810013(EXLCZ)99340000000001754620110314d2004 uy 0itaArchivi degli studenti[electronic resource] facoltà di medicina e chirurgia, 1860-1930 /a cura di Isabella Amadori, Alessia SciamannaBologna CLUEB2004viii, 407 pStrumenti e documenti.Sezione 1: Archivi degli studenti ;4http://www.ilibri.casalini.it/toc/10810013.pdfTOCArchivi degli studenti 018Amadori Isabella1024522Sciamanna Alessia1024523ItFiCItFiCBOOK9910132959603321Archivi degli studenti2435012UNINA01936nam 2200397 450 991064748570332120230510061642.0(CKB)5860000000297471(NjHacI)995860000000297471(EXLCZ)99586000000029747120230510d2023 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierArchitectural Alignment of Access Control Requirements Extracted from Business Processes /Roman PilipchukKarlsruhe, Germany :KIT Scientific Publishing,2023.1 online resource (329 pages) illustrations1000148100 Introduction -- Foundations -- Approach -- Process for Utilizing Approaches in Organizations -- Validation -- Related Work -- Conclusion.Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a. access permissions for role-based access control and b. architectural data flow constraints to identify violations of access control in enterprise application architectures.Computer securitySoftware engineeringEnterprise application integration (Computer systems)Computer security.Software engineering.Enterprise application integration (Computer systems)005.8Pilipchuk Roman1354206NjHacINjHaclBOOK9910647485703321Architectural Alignment of Access Control Requirements Extracted from Business Processes3309831UNINA