PROTECT OF K2 FIVE CORPORATE APPLICATION USING AUTHORIZATION FRAMEWORK


Keywords: BPM, security, roles, K2 five.

Abstract

 The article deals with the possibilities of protecting corporate applications that have been built on the K2 five platform. using new functions that provide an authorization package. Security settings are made with the new tools provided by the authorization framework. The peculiarities of setting up and implementing the benefits of this type of protection are considered. The expediency of using built-in roles for organizing of access to system resources is substantiated. Described how to transfer settings between environments.

References

Anderson, H., Kaji, C., Leisegang, S., Macori, I., Malherbe, G., Montgomery, J., Murphy, C., O'Connor, C., Del Piccolo, S., Schaffer, E., Apergis, J., Geier, C., Petro, A., Talley (2009). Professional K2 blackpearl. Birmingham, UK: Wrox Press Ltd. [in English].
Ani, U. D., He, H., Tiwari, A. (2018). Human factor security: evaluating the cybersecurity capacity of the industrial workforce. Journal of Systems and Information Technology. DOI: 10.1108/JSIT-02-2018-0028. [in English].
Hesson, M., Al‐Ameed, H. (2007). Online security evaluation process for new e‐services. Business Process Management Journal, Vol. 13 Issue: 2, 223-246. DOI: 10.1108/14637150710740473. [in English].
Manfreda, A., Štemberger, M. I. (2018). Establishing a partnership between top and IT managers: A necessity in an era of digital transformation. DOI: 10.1108/ITP-01-2017-0001. [in English].
Shaughnessy, H. (2018). Creating digital transformation: strategies and steps. Strategy & Leadership, Vol. 46 Issue: 2, 19-25. DOI: 10.1108/SL-12-2017-0126. [in English].

Abstract views: 29
PDF Downloads: 27
Published
2018-12-20
How to Cite
Duban, R., Neverov, S., & Duban, A. (2018). PROTECT OF K2 FIVE CORPORATE APPLICATION USING AUTHORIZATION FRAMEWORK. Scientific Journal of Polonia University, 31(6), 41-51. https://doi.org/https://doi.org/10.23856/3104