| PDF (839kB) | |
| PDF (403kB) |
- URN zum Zitieren dieses Dokuments:
- urn:nbn:de:bvb:355-epub-331796
- DOI zum Zitieren dieses Dokuments:
- 10.5283/epub.33179
Zusammenfassung
Roles have evolved into the de facto standard for access control in Enterprise Identity Management. However, companies struggle to develop and maintain a role-based access control state. For the initial role deployment, role mining is widely used. Due to the high number and complexity of available role mining algorithms, companies fail to perceive which is selected best according to their needs. ...
Nur für Besitzer und Autoren: Kontrollseite des Eintrags