| PDF (839kB) | |
| PDF (403kB) |
- URN to cite this document:
- urn:nbn:de:bvb:355-epub-331796
- DOI to cite this document:
- 10.5283/epub.33179
Abstract
Roles have evolved into the de facto standard for access control in Enterprise Identity Management. However, companies struggle to develop and maintain a role-based access control state. For the initial role deployment, role mining is widely used. Due to the high number and complexity of available role mining algorithms, companies fail to perceive which is selected best according to their needs. ...
Owner only: item control page