Direkt zum Inhalt

Kunz, Michael ; Fuchs, Ludwig ; Netter, Michael ; Pernul, Günther

How to Discover High-quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining

Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2016) How to Discover High-quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining. Communications in Computer and Information Science 576 (2), S. 49-67.

Veröffentlichungsdatum dieses Volltextes: 15 Jan 2016 13:29
Artikel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.33179


Zusammenfassung

Roles have evolved into the de facto standard for access control in Enterprise Identity Management. However, companies struggle to develop and maintain a role-based access control state. For the initial role deployment, role mining is widely used. Due to the high number and complexity of available role mining algorithms, companies fail to perceive which is selected best according to their needs. ...

Roles have evolved into the de facto standard for access control in Enterprise Identity Management. However, companies struggle to develop and maintain a role-based access control state. For the initial role deployment, role mining is widely used. Due to the high number and complexity of available role mining algorithms, companies fail to perceive which is selected best according to their needs. Furthermore, requirements on the composition of roles such as reduction of administration cost are to be taken into account in role development. In order to give them guidance, in this paper we aggregate existing role mining approaches and classify them. For consideration of individual prerequisites we extract quality criteria that should be met. Later on, we discuss interdependencies between the criteria to help role developers avoid unwanted side-effects and produce RBAC states that are tailored to their preferences.



Beteiligte Einrichtungen


Details

DokumentenartArtikel
Titel eines Journals oder einer ZeitschriftCommunications in Computer and Information Science
Verlag:Springer
Band:576
Nummer des Zeitschriftenheftes oder des Kapitels:2
Seitenbereich:S. 49-67
Datum1 Januar 2016
Zusätzliche Informationen (Öffentlich)book title "Information Systems Security and Privacy. First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers" (ISBN 978-3-319276-67-05-0937)
InstitutionenWirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Identifikationsnummer
WertTyp
10.1007/978-3-319-27668-7_4DOI
Verwandte URLs
URLURL Typ
http://www.springer.com/de/book/9783319276670Verlag
Stichwörter / KeywordsIAM, Role Quality, RBAC, Role-based Access Control
Dewey-Dezimal-Klassifikation000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik
300 Sozialwissenschaften > 330 Wirtschaft
StatusVeröffentlicht
BegutachtetJa, diese Version wurde begutachtet
An der Universität Regensburg entstandenJa
URN der UB Regensburgurn:nbn:de:bvb:355-epub-331796
Dokumenten-ID33179

Bibliographische Daten exportieren

Nur für Besitzer und Autoren: Kontrollseite des Eintrags

nach oben