Roles in information security–a survey and classification of the research area L Fuchs, G Pernul, R Sandhu computers & security 30 (8), 748-769, 2011 | 152 | 2011 |
HyDRo–hybrid development of roles L Fuchs, G Pernul Information Systems Security: 4th International Conference, ICISS 2008 …, 2008 | 43 | 2008 |
Attribute quality management for dynamic identity and access management M Kunz, A Puchta, S Groll, L Fuchs, G Pernul Journal of information security and applications 44, 64-79, 2019 | 42 | 2019 |
Adaptive identity and access management—contextual data based policies M Hummer, M Kunz, M Netter, L Fuchs, G Pernul EURASIP Journal on Information Security 2016, 1-16, 2016 | 35 | 2016 |
Supporting compliant and secure user handling-a structured approach for in-house identity management L Fuchs, G Pernul The Second International Conference on Availability, Reliability and …, 2007 | 30 | 2007 |
Optimization of access control policies S Kern, T Baumer, S Groll, L Fuchs, G Pernul Journal of Information Security and Applications 70, 103301, 2022 | 20 | 2022 |
Analyzing recent trends in enterprise identity management M Kunz, M Hummer, L Fuchs, M Netter, G Pernul 2014 25th international workshop on database and expert systems applications …, 2014 | 17 | 2014 |
Introducing dynamic identity and access management in organizations M Kunz, L Fuchs, M Hummer, G Pernul Information Systems Security: 11th International Conference, ICISS 2015 …, 2015 | 16 | 2015 |
Minimizing insider misuse through secure Identity Management L Fuchs, G Pernul Security and Communication Networks 5 (8), 847-862, 2012 | 16 | 2012 |
The role mining process model-underlining the need for a comprehensive research perspective L Fuchs, S Meier 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 16 | 2011 |
BusiROLE: a model for integrating business roles into identity management L Fuchs, A Preis Trust, Privacy and Security in Digital Business: 5th International …, 2008 | 15 | 2008 |
Measuring Identity and Access Management Performance-An Expert Survey on Possible Performance Indicators. M Hummer, S Groll, M Kunz, L Fuchs, G Pernul ICISSP, 233-240, 2018 | 12 | 2018 |
Role model optimization for secure role-based identity management L Fuchs, M Kunz, G Pernul | 12 | 2014 |
Prorole: a process-oriented lifecycle model for role systems leveraging identity management and guiding role projects L Fuchs, G Pernul | 12 | 2008 |
Managing the access grid-a process view to minimize insider misuse risks S Meier, L Fuchs, G Pernul | 11 | 2013 |
Advanced identity and access policy management using contextual data M Hummer, M Kunz, M Netter, L Fuchs, G Pernul 2015 10th international conference on availability, reliability and security …, 2015 | 10 | 2015 |
Reducing the risk of insider misuse by revising identity management and useraccount data G Pernul, L Fuchs Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable …, 2010 | 9 | 2010 |
Different approaches to in-house identity management-justification of an assumption L Fuchs, C Broser, G Pernul 2009 international conference on availability, reliability and security, 122-129, 2009 | 8 | 2009 |
Analyzing quality criteria in role-based identity and access management M Kunz, L Fuchs, M Netter, G Pernul 2015 International Conference on Information Systems Security and Privacy …, 2015 | 7 | 2015 |
How to discover high-quality roles? A survey and dependency analysis of quality criteria in role mining M Kunz, L Fuchs, M Netter, G Pernul Information Systems Security and Privacy: First International Conference …, 2015 | 7 | 2015 |