首页> 外文会议>2011 15th IEEE International Enterprise Distributed Object Computing Conference Workshops >Introducing Security Access Control Policies into Legacy Business Processes
【24h】

Introducing Security Access Control Policies into Legacy Business Processes

机译:将安全访问控制策略引入传统业务流程

获取原文

摘要

Applying separation of concerns approaches into business process context generally results in several initiatives oriented to automatic generation of aspect code, generation of specific code according to the kind of concern (code for mapping roles and permissions derived from RBAC model for example), or proposition of new mechanisms as dedicated aspectual languages. Most of these initiatives only consider functional behaviours of business process, omitting special behaviours derived from quality attributes such as security, which can be modelled as concerns that must be supported in the business process. In this paper we propose the integration of cross-cuttings standardized control access policies (based on RBAC model and Oasis XACML) into legacy business processes, using a separation of concerns approach.
机译:将关注点分离方法应用于业务流程上下文通常会导致针对自动生成方面代码,根据关注点类型生成特定代码(例如,用于映射从RBAC模型派生的角色和权限的代码)或作为专用方面语言的新机制。这些举措中的大多数仅考虑业务流程的功能行为,而忽略了从质量属性(例如安全性)派生的特殊行为,可以将其建模为业务流程中必须支持的关注点。在本文中,我们建议使用关注点分离方法将跨行业标准化控制访问策略(基于RBAC模型和Oasis XACML)集成到旧业务流程中。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号