| Download ( PDF | 743kB) | |
| Download ( PDF | 1MB) |
Introducing Dynamic Identity and Access Management in Organizations
Kunz, Michael, Fuchs, Ludwig, Hummer, Matthias und Pernul, Günther (2015) Introducing Dynamic Identity and Access Management in Organizations. In: Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings. Lecture Notes in Computer Science, 9478. Springer, S. 139-158. ISBN 978-3-319-26961-0 (online), 978-3-319-26960-3 (print).Veröffentlichungsdatum dieses Volltextes: 14 Jan 2016 15:36
Buchkapitel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.33180
Zusammenfassung
Efficient and secure management of access to resources is a crucial challenge in today’s corporate IT environments. During the last years, introducing company-wide Identity and Access Management (IAM) infrastructures building on the Role-based Access Control (RBAC) paradigm has become the de facto standard for granting and revoking access to resources. Due to its static nature, the management of ...
Efficient and secure management of access to resources is a crucial challenge in today’s corporate IT environments. During the last years, introducing company-wide Identity and Access Management (IAM) infrastructures building on the Role-based Access Control (RBAC) paradigm has become the de facto standard for granting and revoking access to resources. Due to its static nature, the management of role-based IAM structures, however, leads to increased administrative efforts and is not able to model dynamic business structures. As a result, introducing dynamic attribute-based access privilege provisioning and revocation is currently seen as the next maturity level of IAM. Nevertheless, up to now no structured process for incorporating Attribute-based Access Control (ABAC) policies into static IAM has been proposed. This paper closes the existing research gap by introducing a novel migration guide for extending static IAM systems with dynamic ABAC policies. By means of conducting structured and tool-supported attribute and policy management activities, the migration guide supports organizations to distribute privilege assignments in an application-independent and flexible manner. In order to show its feasibility, we provide a naturalistic evaluation based on two real-world industry use cases.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Buchkapitel | ||||
| ISBN | 978-3-319-26961-0 (online), 978-3-319-26960-3 (print) | ||||
| Buchtitel: | Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings | ||||
|---|---|---|---|---|---|
| Verlag: | Springer | ||||
| Sonstige Reihe: | Lecture Notes in Computer Science | ||||
| Band: | 9478 | ||||
| Seitenbereich: | S. 139-158 | ||||
| Datum | 31 Dezember 2015 | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||
| Identifikationsnummer |
| ||||
| Stichwörter / Keywords | Identity and Access Management IAM ABAC Policies | ||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik 300 Sozialwissenschaften > 330 Wirtschaft | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Ja | ||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-331804 | ||||
| Dokumenten-ID | 33180 |
Downloadstatistik
Downloadstatistik