| Download ( PDF | 839kB) | |
| Download ( PDF | 403kB) |
How to Discover High-quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining
Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2016) How to Discover High-quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining. Communications in Computer and Information Science 576 (2), S. 49-67.Veröffentlichungsdatum dieses Volltextes: 15 Jan 2016 13:29
Artikel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.33179
Zusammenfassung
Roles have evolved into the de facto standard for access control in Enterprise Identity Management. However, companies struggle to develop and maintain a role-based access control state. For the initial role deployment, role mining is widely used. Due to the high number and complexity of available role mining algorithms, companies fail to perceive which is selected best according to their needs. ...
Roles have evolved into the de facto standard for access control in Enterprise Identity Management. However, companies struggle to develop and maintain a role-based access control state. For the initial role deployment, role mining is widely used. Due to the high number and complexity of available role mining algorithms, companies fail to perceive which is selected best according to their needs. Furthermore, requirements on the composition of roles such as reduction of administration cost are to be taken into account in role development. In order to give them guidance, in this paper we aggregate existing role mining approaches and classify them. For consideration of individual prerequisites we extract quality criteria that should be met. Later on, we discuss interdependencies between the criteria to help role developers avoid unwanted side-effects and produce RBAC states that are tailored to their preferences.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Artikel | ||||
| Titel eines Journals oder einer Zeitschrift | Communications in Computer and Information Science | ||||
| Verlag: | Springer | ||||
|---|---|---|---|---|---|
| Band: | 576 | ||||
| Nummer des Zeitschriftenheftes oder des Kapitels: | 2 | ||||
| Seitenbereich: | S. 49-67 | ||||
| Datum | 1 Januar 2016 | ||||
| Zusätzliche Informationen (Öffentlich) | book title "Information Systems Security and Privacy. First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers" (ISBN 978-3-319276-67-05-0937) | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||
| Identifikationsnummer |
| ||||
| Verwandte URLs |
| ||||
| Stichwörter / Keywords | IAM, Role Quality, RBAC, Role-based Access Control | ||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik 300 Sozialwissenschaften > 330 Wirtschaft | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Ja | ||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-331796 | ||||
| Dokumenten-ID | 33179 |
Downloadstatistik
Downloadstatistik