| Download ( PDF | 243kB) |
An MDA-Based Environment for Generating Access Control Policies
Klarl, Heiko, Marmé, Florian, Wolff, Christian, Emig, Christian und Abeck, Sebastian (2009) An MDA-Based Environment for Generating Access Control Policies. In: Fischer-Hübner, Simone und Lambrinoudakis, Costas und Pernul, Günther, (eds.) Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, 5695. Springer, Berlin, S. 115-126. ISBN 978-3-642-03747-4.Veröffentlichungsdatum dieses Volltextes: 09 Sep 2009 10:19
Buchkapitel
Zusammenfassung
Identity management and access control are essential in the enterprise IT landscape in order to control access to applications and to fulfil laws or regulations. The global competition of enterprises leads to short development cycles and fast changes of IT applications, which requires also an error-free and quick adaption of its security. The model-driven development of access control policies ...
Identity management and access control are essential in the enterprise IT landscape in order to control access to applications and to fulfil laws or regulations. The global competition of enterprises leads to short development cycles and fast changes of IT applications, which requires also an error-free and quick adaption of its security. The model-driven development of access control policies promises to cope with this situation. This work introduces an mda-based environment for generating access control policies. A comprehensive overview is given on the organisational aspects, describing details of roles, artefacts and tools involved. On this basis the four phases of a model-driven development process for access control policies and their organisational aspects are presented.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Buchkapitel | ||||||||||||
| ISBN | 978-3-642-03747-4 | ||||||||||||
| Buchtitel: | Trust, Privacy and Security in Digital Business | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Verlag: | Springer | ||||||||||||
| Ort der Veröffentlichung: | Berlin | ||||||||||||
| Sonstige Reihe: | Lecture Notes in Computer Science | ||||||||||||
| Band: | 5695 | ||||||||||||
| Seitenbereich: | S. 115-126 | ||||||||||||
| Datum | 2009 | ||||||||||||
| Zusätzliche Informationen (Öffentlich) | The original publication is available at www.springerlink.com | ||||||||||||
| Institutionen | Sprach- und Literatur- und Kulturwissenschaften > Institut für Information und Medien, Sprache und Kultur (I:IMSK) > Lehrstuhl für Medieninformatik (Prof. Dr. Christian Wolff) Informatik und Data Science > Fachbereich Menschzentrierte Informatik > Lehrstuhl für Medieninformatik (Prof. Dr. Christian Wolff) | ||||||||||||
| Identifikationsnummer |
| ||||||||||||
| Klassifikation |
| ||||||||||||
| Stichwörter / Keywords | Model-driven Security, Access Control Policies, Identity Management, Model-driven Development Process | ||||||||||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 010 Bibliografien 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik | ||||||||||||
| Status | Veröffentlicht | ||||||||||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||||||||||
| An der Universität Regensburg entstanden | Zum Teil | ||||||||||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-92886 | ||||||||||||
| Dokumenten-ID | 9288 |
Downloadstatistik
Downloadstatistik