Direkt zum Inhalt

Fuchs, Ludwig ; Pernul, Günther ; Sandhu, Ravi

Roles In Information Security - A Survey And Classification Of The Research Area

Fuchs, Ludwig, Pernul, Günther und Sandhu, Ravi (2011) Roles In Information Security - A Survey And Classification Of The Research Area. Computers & Security.

Veröffentlichungsdatum dieses Volltextes: 24 Aug 2011 07:23
Artikel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.21886


Zusammenfassung

The concept of roles has been prevalent in the area of Information Security for more than 15 years already. It promises simplified and flexible user management, reduced administrative costs, improved security, as well as the integration of employees' business functions into the IT administration. A comprehensive scientific literature collection revealed more than 1300 publications dealing with ...

The concept of roles has been prevalent in the area of Information Security for more than 15 years already. It promises simplified and flexible user management, reduced administrative costs, improved security, as well as the integration of employees' business functions into the IT administration. A comprehensive scientific literature collection revealed more than 1300 publications dealing with the application of sociological role theory in the context of Information Security up to now. Although there is an ANSI/NIST standard and an ISO standard proposal, a variety of competing models and interpretations of the role concept have developed. The major contribution of this survey is a categorization of the complete underlying set of publications into different classes. The main part of the work is investigating 32 identified research directions, evaluating their importance and analyzing research tendencies. An electronic bibliography including all surveyed publications together with the classification information is provided additionally. As a final contribution potential future developments in the area of role-research are considered. (C) 2011 Elsevier Ltd. All rights reserved.



Beteiligte Einrichtungen


Details

DokumentenartArtikel
Titel eines Journals oder einer ZeitschriftComputers & Security
Verlag:ELSEVIER ADVANCED TECHNOLOGY
Ort der Veröffentlichung:OXFORD
Datum16 August 2011
InstitutionenWirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Identifikationsnummer
WertTyp
10.1016/j.cose.2011.08.002DOI
Stichwörter / KeywordsACCESS-CONTROL; SYSTEMS; MODELS; RBAC; Role-based access control; RBAC; Role theory; Information Security; Survey
Dewey-Dezimal-Klassifikation000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik
300 Sozialwissenschaften > 330 Wirtschaft
StatusVeröffentlicht
BegutachtetJa, diese Version wurde begutachtet
An der Universität Regensburg entstandenJa
URN der UB Regensburgurn:nbn:de:bvb:355-epub-218868
Dokumenten-ID21886

Bibliographische Daten exportieren

Nur für Besitzer und Autoren: Kontrollseite des Eintrags

nach oben