Introducing Security Access Control Policies into Legacy Business Processes

Download Now
Provided by: University of Newcastle
Topic: Big Data
Format: PDF
Applying separation of concerns approaches into business process context generally results in several initiatives oriented to automatic generation of aspect code, generation of specific code according to the kind of concern (code for mapping roles and permissions derived from RBAC model for example), or proposition of new mechanisms as dedicated aspectual languages. Most of these initiatives only consider functional behaviors of business process, omitting special behaviors derived from quality attributes such as security, which can be modeled as concerns that must be supported in the business process.
Download Now

Find By Topic