PDF - Angenommene Version | Lizenz: Creative Commons Namensnennung-NichtKommerziell-KeineBearbeitung 4.0 International |
Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture
Puchta, Alexander
, Groll, Sebastian
und Pernul, Günther
(2021)
Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture.
In: ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy, 11.02. - 13.02.2021, Online.
Veröffentlichungsdatum dieses Volltextes: 13 Jan 2026 05:49
Konferenz- oder Workshop-Beitrag
DOI zum Zitieren dieses Dokuments: 10.5283/epub.78389
Zusammenfassung
Identity and access management (IAM) functions as a core component for today’s enterprises managing digital identities and their access to resources. However, IAM systems are quite isolated from other applications with useful information resulting in individual data pots. By interconnecting these systems, important information on relevant IAM entities like criticality or usage information can be ...
Identity and access management (IAM) functions as a core component for today’s enterprises managing digital identities and their access to resources. However, IAM systems are quite isolated from other applications with useful information resulting in individual data pots. By interconnecting these systems, important information on relevant IAM entities like criticality or usage information can be additionally gathered for further improvement. Current IAM landscapes within enterprises are not prepared for such challenges as the data needs to be harmonised, analysed, and verified. Within this work a state-of-the-art IAM architecture in enterprises and existing shortcomings are defined. Based on these, an extended IAM architecture scheme is proposed and described in detail. Key component is the integration of additional information sources for mutual benefit in IAM and external applications. Finally, the approach is applied to two use cases based on real data. They originate from our conducted IAM projects and show the feasibility of the proposed architecture.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Konferenz- oder Workshop-Beitrag (Paper) | ||||
| Seitenbereich: | S. 611-618 | ||||
|---|---|---|---|---|---|
| Datum | 11 Februar 2021 | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||
| Identifikationsnummer |
| ||||
| Stichwörter / Keywords | Identity and Access Management, IAM, Access Control, Architecture, Big Data, Stream Data, Real Time Analysis | ||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik 300 Sozialwissenschaften > 330 Wirtschaft | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Zum Teil | ||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-783890 | ||||
| Dokumenten-ID | 78389 |
Downloadstatistik
Downloadstatistik