DOI: 10.1007/978-3-540-85735-8_13
|View full text |Cite
|
Sign up to set email alerts
|

BusiROLE: A Model for Integrating Business Roles into Identity Management

Abstract: Abstract. The complexity of modern organisations' IT landscapes has grown dramatically over the last decades. Many enterprises initiate role projects in order to reorganise their access structures based on an organisation-wide Identity Management Infrastructure (IdMI). This paper surveys role models and related literature and identifies different role properties. It shows that current role models are not feasible for their usage in IdMIs. By implementing one single type of role they fail to take business requi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…HyDRo is fully supported by the contROLE role development software which will be presented in section 4. HyDRo furthermore uses busiROLE [29] as Meta-Model.…”
Section: Methodological Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…HyDRo is fully supported by the contROLE role development software which will be presented in section 4. HyDRo furthermore uses busiROLE [29] as Meta-Model.…”
Section: Methodological Backgroundmentioning
confidence: 99%
“…Organisational Roles (phase 5) represent job positions while Functional Roles (phase 6) correspond to the task bundles of employees. By allowing for the definition of business role types [29], HyDRo supports incremental role development. Phases 4, 5, and 6 from figure 3 are modelled similar, even though the underlying algorithms, the extent of hybrid communication, and the importance of OOS layer input information are varying.…”
Section: Role Developmentmentioning
confidence: 99%
“…All of them build upon the data elements known from the RBAC standard. A comparison of several models has been provided in Fuchs and Preis (2008).…”
Section: Role Modelsmentioning
confidence: 99%
“…Identity Management as part of ESM, as one driver for this area, has been a field of emerging interest from 2006 on, dealing with the management and administration of user data. Fuchs and Preis (2008) analyzed different role properties and use the notion of business roles that serve as intermediate elements between job-oriented business tasks and resource-oriented IT requirements. The tendency for implementing organization-wide user management infrastructures requires the development and enforcement of role-based security policies.…”
Section: Roles In Middleware Architecturesmentioning
confidence: 99%
“…In recent years, role-based access control model has been widely researched and applied in some database systems and operating systems [1], [2]. The most representative study is RBAC96 model defined by Ravi Sandhu et al Based on this model, the RBAC unified model was published as the NIST RBAC model in 2000 and adopted as ANSI/INCITS standard in 2004.…”
Section: Introductionmentioning
confidence: 99%