The Second International Conference on Availability, Reliability and Security (ARES'07) 2007
DOI: 10.1109/ares.2007.145
|View full text |Cite
|
Sign up to set email alerts
|

Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management

Abstract: The catchword "compliance" dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal and external standards and regulations like the US SOX act. Identity Management is seen as a main provider of compliance in modern companies. However, its organisational aspects are underestimated in many projects, lacking a comprehensive approach to introduce in-house Identity Management. This work is based on the experiences gained from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 7 publications
0
20
0
Order By: Relevance
“…[5,9]), as well as their underlying access control models has been carried out [10]. However, while the importance of IAM policies in general [5] and of organizational policies in particular [11] has been acknowledged, hardly any work specifically considers the challenge of policy detection and management in large and complex environments.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…[5,9]), as well as their underlying access control models has been carried out [10]. However, while the importance of IAM policies in general [5] and of organizational policies in particular [11] has been acknowledged, hardly any work specifically considers the challenge of policy detection and management in large and complex environments.…”
Section: Related Workmentioning
confidence: 99%
“…This includes modules for user management, access management, data handling and synchronization, or user provisioning [5,9]. User management is concerned with managing the identity lifecycle, whereas access management provides functionality to authenticate and authorize users.…”
Section: Functionalitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…It deals with the storage, administration, and usage of digital identities during their lifecycle. The aforementioned identity chaos needs to be faced by implementing a centralised IdMI as shown in [7]. Its main building blocks are a Directory Service, User Management, Access Management, and an Auditing Module.…”
Section: In-house Identity Managementmentioning
confidence: 99%
“…Roles are seen as means to meet compliance demands in general. Yet, implementing a technical IdMI as presented in [7] is only the starting point for getting compliant. IdM is not able to take business needs into consideration on a purely technical level.…”
Section: Introductionmentioning
confidence: 99%