| Download ( PDF | 845kB) |
Minimizing insider misuse through secure Identity Management
Fuchs, Ludwig und Pernul, Günther (2012) Minimizing insider misuse through secure Identity Management. Security and Communication Networks 5 (8), S. 847-862.Veröffentlichungsdatum dieses Volltextes: 01 Aug 2012 07:48
Artikel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.25548
Zusammenfassung
To avoid insider computer misuse, identity, and authorization data referring to the legitimate users of systems must be properly organized, constantly and systematically analyzed, and evaluated. In order to support this, structured and secure Identity Management is required. A comprehensive methodology supporting Identity Management within organizations has been developed, including gathering of ...
To avoid insider computer misuse, identity, and authorization data referring to the legitimate users of systems must be properly organized, constantly and systematically analyzed, and evaluated. In order to support this, structured and secure Identity Management is required. A comprehensive methodology supporting Identity Management within organizations has been developed, including gathering of identity data spread among different applications, systematic cleansing of user account data in order to detect semantic as well as syntactic errors, grouping of privileges and access rights, and semiautomatic engineering of user roles. The focus of this paper is on the cleansing of identity and account data leading to feedback where insider misuse due to existing privileges which go beyond the scope of the users' current need-to-know may occur. The paper in detail presents used data cleansing mechanisms and underlines their applicability in two real-world case studies.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Artikel | ||||
| Titel eines Journals oder einer Zeitschrift | Security and Communication Networks | ||||
| Verlag: | John Wiley & Sons, Ltd. | ||||
|---|---|---|---|---|---|
| Band: | 5 | ||||
| Nummer des Zeitschriftenheftes oder des Kapitels: | 8 | ||||
| Seitenbereich: | S. 847-862 | ||||
| Datum | August 2012 | ||||
| Zusätzliche Informationen (Öffentlich) | Article first published online: 25 FEB 2011 | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||
| Identifikationsnummer |
| ||||
| Verwandte URLs |
| ||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Ja | ||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-255482 | ||||
| Dokumenten-ID | 25548 |
Downloadstatistik
Downloadstatistik