Direkt zum Inhalt

Kunz, Michael ; Fuchs, Ludwig ; Hummer, Matthias ; Pernul, Günther

Introducing Dynamic Identity and Access Management in Organizations

Kunz, Michael, Fuchs, Ludwig, Hummer, Matthias und Pernul, Günther (2015) Introducing Dynamic Identity and Access Management in Organizations. In: Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings. Lecture Notes in Computer Science, 9478. Springer, S. 139-158. ISBN 978-3-319-26961-0 (online), 978-3-319-26960-3 (print).

Veröffentlichungsdatum dieses Volltextes: 14 Jan 2016 15:36
Buchkapitel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.33180


Zusammenfassung

Efficient and secure management of access to resources is a crucial challenge in today’s corporate IT environments. During the last years, introducing company-wide Identity and Access Management (IAM) infrastructures building on the Role-based Access Control (RBAC) paradigm has become the de facto standard for granting and revoking access to resources. Due to its static nature, the management of ...

Efficient and secure management of access to resources is a crucial challenge in today’s corporate IT environments. During the last years, introducing company-wide Identity and Access Management (IAM) infrastructures building on the Role-based Access Control (RBAC) paradigm has become the de facto standard for granting and revoking access to resources. Due to its static nature, the management of role-based IAM structures, however, leads to increased administrative efforts and is not able to model dynamic business structures. As a result, introducing dynamic attribute-based access privilege provisioning and revocation is currently seen as the next maturity level of IAM. Nevertheless, up to now no structured process for incorporating Attribute-based Access Control (ABAC) policies into static IAM has been proposed. This paper closes the existing research gap by introducing a novel migration guide for extending static IAM systems with dynamic ABAC policies. By means of conducting structured and tool-supported attribute and policy management activities, the migration guide supports organizations to distribute privilege assignments in an application-independent and flexible manner. In order to show its feasibility, we provide a naturalistic evaluation based on two real-world industry use cases.



Beteiligte Einrichtungen


Details

DokumentenartBuchkapitel
ISBN978-3-319-26961-0 (online), 978-3-319-26960-3 (print)
Buchtitel:Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings
Verlag:Springer
Sonstige Reihe:Lecture Notes in Computer Science
Band:9478
Seitenbereich:S. 139-158
Datum31 Dezember 2015
InstitutionenWirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Identifikationsnummer
WertTyp
10.1007/978-3-319-26961-0_9DOI
Stichwörter / KeywordsIdentity and Access Management IAM ABAC Policies
Dewey-Dezimal-Klassifikation000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik
300 Sozialwissenschaften > 330 Wirtschaft
StatusVeröffentlicht
BegutachtetJa, diese Version wurde begutachtet
An der Universität Regensburg entstandenJa
URN der UB Regensburgurn:nbn:de:bvb:355-epub-331804
Dokumenten-ID33180

Bibliographische Daten exportieren

Nur für Besitzer und Autoren: Kontrollseite des Eintrags

nach oben