| PDF - Published Version (306kB) |
- URN to cite this document:
- urn:nbn:de:bvb:355-epub-279301
- DOI to cite this document:
- 10.5283/epub.27930
Abstract
It is generally agreed upon the fact that the quality of Identity- and Access Management (IAM) data such as user accounts, access privileges or consistent user representation among different security domains is low. Growing user populations in medium- and large-sized organizations lead to a so called “identity chaos” in which over-privileged employees increase the risk of insider misuse. Recent ...

Owner only: item control page
Download Statistics