Direkt zum Inhalt

Pernul, Günther ; Fuchs, Ludwig

Reducing the Risk of Insider Misuse by Revising Identity Management and UserAccount Data

Pernul, Günther und Fuchs, Ludwig (2010) Reducing the Risk of Insider Misuse by Revising Identity Management and UserAccount Data. In: 2nd Int. Workshop on Managing Insider Security Threats, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Morioka, Iwate, Japan.

Veröffentlichungsdatum dieses Volltextes: 31 Mai 2010 13:08
Buchkapitel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.15129


Zusammenfassung

To avoid insider computer misuse, identity and authorization data referring to the legitimate users of the systems must be properly organized and constantly and systematically analyzed and evaluated. In order to support this, a methodology for structured Identity Management has been developed. This methodology includes gathering of identity data spread among different applications, systematic ...

To avoid insider computer misuse, identity and authorization data referring to the legitimate users of the systems must be properly organized and constantly and systematically analyzed and evaluated. In order to support this, a methodology for structured Identity Management has been developed.
This methodology includes gathering of identity data spread among different applications, systematic cleansing of user account data in order to detect semantic as well as syntactic errors, grouping of privileges and access rights, and semiautomatic engineering of user roles. Each of the steps involved includes quality criteria and comprehensive tool support. The focus of this paper is on the data
cleansing phase leading to feedback where insider misuse may occur due to existing privileges which go beyond the scope of the users’ current need-to-know.


Beteiligte Einrichtungen


Details

DokumentenartBuchkapitel
Titel eines Journals oder einer ZeitschriftJournal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA)
Buchtitel:2nd Int. Workshop on Managing Insider Security Threats, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
Ort der Veröffentlichung:Morioka, Iwate, Japan
DatumJuni 2010
InstitutionenWirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Dewey-Dezimal-Klassifikation000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik
StatusVeröffentlicht
BegutachtetJa, diese Version wurde begutachtet
An der Universität Regensburg entstandenJa
URN der UB Regensburgurn:nbn:de:bvb:355-epub-151293
Dokumenten-ID15129

Bibliographische Daten exportieren

Nur für Besitzer und Autoren: Kontrollseite des Eintrags

nach oben