Introducing Security Access Control Policies into Legacy Business Processes.
Fáber D. GiraldoMireille Blay-FornarinoSébastien MosserPublished in: EDOCW (2011)
Keyphrases
- business processes
- access control policies
- access control
- security policies
- legacy systems
- access control systems
- business process
- trust negotiation
- security mechanisms
- security requirements
- conflict resolution
- workflow management systems
- security management
- security issues
- data centric
- fine grained
- network security
- process model
- business process management
- business rules
- web services
- formal language
- business partners
- distributed systems
- service oriented architecture
- information security
- distributed environment
- intrusion detection
- modeling language
- reverse engineering
- information flow
- business goals