Language:
English
日文
簡体中文
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information flow based security cont...
~
Bischoff, Rainer.
Information flow based security control beyond RBAC[electronic resource] :How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
Record Type:
Language materials, printed : Monograph/item
[NT 15000414]:
005.8
Title/Author:
Information flow based security control beyond RBAC : How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) // by Klaus-Peter Fischer-Hellmann.
Author:
Fischer-Hellmann, Klaus-Peter.
other author:
Bischoff, Rainer.
Published:
Wiesbaden : : Springer Fachmedien Wiesbaden :, 2012.
Description:
159 p. : : ill., digital ;; 25 cm.
Contained By:
Springer eBooks
Subject:
Computer networks - Access control.
Subject:
Flow control (Data transmission systems)
Subject:
BPEL (Computer program language)
Subject:
Management information systems.
Subject:
Computer Science.
Subject:
Systems and Data Security.
Subject:
Data Structures.
Subject:
Coding and Information Theory.
ISBN:
9783834826183 (electronic bk.)
ISBN:
9783834826176 (paper)
Online resource:
http://dx.doi.org/10.1007/978-3-8348-2618-3
Information flow based security control beyond RBAC[electronic resource] :How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
Fischer-Hellmann, Klaus-Peter.
Information flow based security control beyond RBAC
How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /[electronic resource] :by Klaus-Peter Fischer-Hellmann. - Wiesbaden :Springer Fachmedien Wiesbaden :2012. - 159 p. :ill., digital ;25 cm. - Corporate IT. - Corporate IT..
ISBN: 9783834826183 (electronic bk.)Subjects--Topical Terms:
445512
Computer networks
--Access control.
LC Class. No.: TK5105.597 / .F57 2012
Dewey Class. No.: 005.8
Information flow based security control beyond RBAC[electronic resource] :How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
LDR
:00970nam a2200265 a 4500
001
372326
003
DE-He213
005
20121214090041.0
006
m d
007
cr nn 008maaau
008
130108s2012 gw s 0 eng d
020
$a
9783834826183 (electronic bk.)
020
$a
9783834826176 (paper)
035
$a
978-3-8348-2618-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.597
$b
.F57 2012
082
0 4
$a
005.8
$2
23
090
$a
TK5105.597
$b
.F529 2012
100
1
$a
Fischer-Hellmann, Klaus-Peter.
$3
490542
245
1 0
$a
Information flow based security control beyond RBAC
$h
[electronic resource] :
$b
How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
$c
by Klaus-Peter Fischer-Hellmann.
260
$a
Wiesbaden :
$b
Springer Fachmedien Wiesbaden :
$b
Imprint: Springer Vieweg,
$c
2012.
300
$a
159 p. :
$b
ill., digital ;
$c
25 cm.
490
1
$a
Corporate IT
650
0
$a
Computer networks
$x
Access control.
$3
445512
650
0
$a
Flow control (Data transmission systems)
$3
490545
650
0
$a
BPEL (Computer program language)
$3
341441
650
0
$a
Management information systems.
$3
336744
650
1 4
$a
Computer Science.
$3
423143
650
2 4
$a
Systems and Data Security.
$3
466229
650
2 4
$a
Data Structures.
$3
467911
650
2 4
$a
Coding and Information Theory.
$3
465532
700
1
$a
Bischoff, Rainer.
$3
490543
710
2
$a
SpringerLink (Online service)
$3
463450
773
0
$t
Springer eBooks
830
0
$a
Corporate IT.
$3
490544
856
4 0
$u
http://dx.doi.org/10.1007/978-3-8348-2618-3
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-8348-2618-3
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login