| Download ( PDF | 1MB) |
Roles In Information Security - A Survey And Classification Of The Research Area
Fuchs, Ludwig, Pernul, Günther und Sandhu, Ravi (2011) Roles In Information Security - A Survey And Classification Of The Research Area. Computers & Security.Veröffentlichungsdatum dieses Volltextes: 24 Aug 2011 07:23
Artikel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.21886
Zusammenfassung
The concept of roles has been prevalent in the area of Information Security for more than 15 years already. It promises simplified and flexible user management, reduced administrative costs, improved security, as well as the integration of employees' business functions into the IT administration. A comprehensive scientific literature collection revealed more than 1300 publications dealing with ...
The concept of roles has been prevalent in the area of Information Security for more than 15 years already. It promises simplified and flexible user management, reduced administrative costs, improved security, as well as the integration of employees' business functions into the IT administration. A comprehensive scientific literature collection revealed more than 1300 publications dealing with the application of sociological role theory in the context of Information Security up to now. Although there is an ANSI/NIST standard and an ISO standard proposal, a variety of competing models and interpretations of the role concept have developed. The major contribution of this survey is a categorization of the complete underlying set of publications into different classes. The main part of the work is investigating 32 identified research directions, evaluating their importance and analyzing research tendencies. An electronic bibliography including all surveyed publications together with the classification information is provided additionally. As a final contribution potential future developments in the area of role-research are considered. (C) 2011 Elsevier Ltd. All rights reserved.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Artikel | ||||
| Titel eines Journals oder einer Zeitschrift | Computers & Security | ||||
| Verlag: | ELSEVIER ADVANCED TECHNOLOGY | ||||
|---|---|---|---|---|---|
| Ort der Veröffentlichung: | OXFORD | ||||
| Datum | 16 August 2011 | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||
| Identifikationsnummer |
| ||||
| Stichwörter / Keywords | ACCESS-CONTROL; SYSTEMS; MODELS; RBAC; Role-based access control; RBAC; Role theory; Information Security; Survey | ||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik 300 Sozialwissenschaften > 330 Wirtschaft | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Ja | ||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-218868 | ||||
| Dokumenten-ID | 21886 |
Downloadstatistik
Downloadstatistik