Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
Record details
- ISBN: 9783834826183
-
Physical Description:
electronic
electronic resource
access
remote
XXI, 161 p. 25 illus. online resource. - Publisher: Wiesbaden : Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg, 2012.
Search for related items by subject
| Subject: | Computer science Data protection Data structures (Computer science) Coding theory Computer Science Systems and Data Security Data Structures Coding and Information Theory |
Search for related items by series
Electronic resources
| LDR | 01789nam a22004455i 4500 | ||
|---|---|---|---|
| 001 | 30413 | ||
| 003 | CONS | ||
| 005 | 20130727045305.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 121116s2012 gw | s |||| 0|eng d | ||
| 020 | . | ‡a9783834826183 ‡9978-3-8348-2618-3 | |
| 024 | 7 | . | ‡a10.1007/978-3-8348-2618-3 ‡2doi |
| 035 | . | ‡a(DE-He213)978-3-8348-2618-3 | |
| 050 | 4. | ‡aQA76.9.A25 | |
| 072 | 7. | ‡aUR ‡2bicssc | |
| 072 | 7. | ‡aUTN ‡2bicssc | |
| 072 | 7. | ‡aCOM053000 ‡2bisacsh | |
| 100 | 1 | . | ‡aFischer-Hellmann, Klaus-Peter. ‡eauthor. |
| 245 | 1 | 0. | ‡aInformation Flow Based Security Control Beyond RBAC ‡h[electronic resource] : ‡bHow to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) / ‡cby Klaus-Peter Fischer-Hellmann ; edited by Rainer Bischoff. |
| 264 | 1. | ‡aWiesbaden : ‡bSpringer Fachmedien Wiesbaden : ‡bImprint: Springer Vieweg, ‡c2012. | |
| 300 | . | ‡aXXI, 161 p. 25 illus. ‡bonline resource. | |
| 336 | . | ‡atext ‡btxt ‡2rdacontent | |
| 337 | . | ‡acomputer ‡bc ‡2rdamedia | |
| 338 | . | ‡aonline resource ‡bcr ‡2rdacarrier | |
| 347 | . | ‡atext file ‡bPDF ‡2rda | |
| 490 | 1 | . | ‡aIT im Unternehmen ; ‡v1 |
| 650 | 0. | ‡aComputer science. | |
| 650 | 0. | ‡aData protection. | |
| 650 | 0. | ‡aData structures (Computer science). | |
| 650 | 0. | ‡aCoding theory. | |
| 650 | 1 | 4. | ‡aComputer Science. |
| 650 | 2 | 4. | ‡aSystems and Data Security. |
| 650 | 2 | 4. | ‡aData Structures. |
| 650 | 2 | 4. | ‡aCoding and Information Theory. |
| 700 | 1 | . | ‡aBischoff, Rainer. ‡eeditor. |
| 710 | 2 | . | ‡aSpringerLink (Online service) |
| 773 | 0 | . | ‡tSpringer eBooks |
| 776 | 0 | 8. | ‡iPrinted edition: ‡z9783834826176 |
| 830 | 0. | ‡aIT im Unternehmen ; ‡v1 | |
| 856 | 4 | 0. | ‡uhttp://biblioteca.ipicyt.edu.mx:2048/login?url=http://dx.doi.org/10.1007/978-3-8348-2618-3 ‡yTexto completo ‡9CONS |
| 950 | . | ‡aComputer Science (Springer-11645) | |
| 901 | . | ‡a30413 ‡b ‡c30413 ‡tbiblio ‡sSystem Local | |