Roles in information security–a survey and classification of the research area
The concept of roles has been prevalent in the area of Information Security for more than 15
years already. It promises simplified and flexible user management, reduced administrative …
years already. It promises simplified and flexible user management, reduced administrative …
A critical analysis of Zero Trust Architecture (ZTA)
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by
industry and government as a new way to produce systems with a high degree of security …
industry and government as a new way to produce systems with a high degree of security …
HyDRo–hybrid development of roles
Defining valid enterprise-wide roles needs to be carried out on the basis of a predefined
Role Development Methodology. Hybrid role development combining elements from Role …
Role Development Methodology. Hybrid role development combining elements from Role …
BusiROLE: a model for integrating business roles into identity management
L Fuchs, A Preis - Trust, Privacy and Security in Digital Business: 5th …, 2008 - Springer
The complexity of modern organisations' IT landscapes has grown dramatically over the last
decades. Many enterprises initiate role projects in order to reorganise their access structures …
decades. Many enterprises initiate role projects in order to reorganise their access structures …
[PDF][PDF] The emergence of a national eID solution–an actor-network perspective
F Söderström, U Melin - The 35th Information Systems Research …, 2012 - researchgate.net
This paper will focus on the emergence of the Swedish National Electronic Identification
(eID) from an Actor-Network perspective. As being a significant part of the public sectors …
(eID) from an Actor-Network perspective. As being a significant part of the public sectors …
Identity Management for Health Professionals: A Method for the Integration of Responsibility, Organization, and IT
P Rohner - Business & Information Systems Engineering, 2013 - Springer
As a result of growing economic pressures, collaborations and process orientation are
rapidly gaining importance for hospitals. With organisation and software landscapes which …
rapidly gaining importance for hospitals. With organisation and software landscapes which …
Different approaches to in-house identity management-justification of an assumption
The use of roles in identity management infrastructures (IdMI) has proven to be a solution for
reorganising and securing access structures of employees. The definition of enterprise-wide …
reorganising and securing access structures of employees. The definition of enterprise-wide …