Conference
Introducing Security Access Control Policies into Legacy Business Processes
Abstract
Applying separation of concerns approaches into business process context generally results in several initiatives oriented to automatic generation of aspect code, generation of specific code according to the kind of concern (code for mapping roles and permissions derived from RBAC model for example), or proposition of new mechanisms as dedicated aspectual languages. Most of these initiatives only consider functional behaviours of business …
Authors
Giraldo FD; Blay-Fornarino M; Mosser S
Pagination
pp. 42-49
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Publication Date
August 1, 2011
DOI
10.1109/edocw.2011.11
Name of conference
2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops