LEADER 01936nam 2200397 450 001 9910647485703321 005 20230510061642.0 035 $a(CKB)5860000000297471 035 $a(NjHacI)995860000000297471 035 $a(EXLCZ)995860000000297471 100 $a20230510d2023 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aArchitectural Alignment of Access Control Requirements Extracted from Business Processes /$fRoman Pilipchuk 210 1$aKarlsruhe, Germany :$cKIT Scientific Publishing,$d2023. 215 $a1 online resource (329 pages) $cillustrations 311 $a1000148100 327 $aIntroduction -- Foundations -- Approach -- Process for Utilizing Approaches in Organizations -- Validation -- Related Work -- Conclusion. 330 $aBusiness processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a. access permissions for role-based access control and b. architectural data flow constraints to identify violations of access control in enterprise application architectures. 606 $aComputer security 606 $aSoftware engineering 606 $aEnterprise application integration (Computer systems) 615 0$aComputer security. 615 0$aSoftware engineering. 615 0$aEnterprise application integration (Computer systems) 676 $a005.8 700 $aPilipchuk$b Roman$01354206 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910647485703321 996 $aArchitectural Alignment of Access Control Requirements Extracted from Business Processes$93309831 997 $aUNINA