Architectural Alignment Of Access Control Requirements Extracted From Business Processes


Download Architectural Alignment Of Access Control Requirements Extracted From Business Processes PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Architectural Alignment Of Access Control Requirements Extracted From Business Processes book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Architectural Alignment of Access Control Requirements Extracted from Business Processes


Architectural Alignment of Access Control Requirements Extracted from Business Processes

Author: Pilipchuk, Roman

language: en

Publisher: KIT Scientific Publishing

Release Date: 2023-01-27


DOWNLOAD





Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.

Architectural Alignment of Access Control Requirements Extracted from Business Processes


Architectural Alignment of Access Control Requirements Extracted from Business Processes

Author: Roman Pilipchuk

language: en

Publisher:

Release Date: 2021


DOWNLOAD





Context-based Access Control and Attack Modelling and Analysis


Context-based Access Control and Attack Modelling and Analysis

Author: Walter, Maximilian

language: en

Publisher: KIT Scientific Publishing

Release Date: 2024-07-03


DOWNLOAD





This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development.