Roles in information security–a survey and classification of the research area

L Fuchs, G Pernul, R Sandhu - computers & security, 2011 - Elsevier
The concept of roles has been prevalent in the area of Information Security for more than 15
years already. It promises simplified and flexible user management, reduced administrative …

A critical analysis of Zero Trust Architecture (ZTA)

EB Fernandez, A Brazhuk - Computer Standards & Interfaces, 2024 - Elsevier
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by
industry and government as a new way to produce systems with a high degree of security …

HyDRo–hybrid development of roles

L Fuchs, G Pernul - … Systems Security: 4th International Conference, ICISS …, 2008 - Springer
Defining valid enterprise-wide roles needs to be carried out on the basis of a predefined
Role Development Methodology. Hybrid role development combining elements from Role …

BusiROLE: a model for integrating business roles into identity management

L Fuchs, A Preis - Trust, Privacy and Security in Digital Business: 5th …, 2008 - Springer
The complexity of modern organisations' IT landscapes has grown dramatically over the last
decades. Many enterprises initiate role projects in order to reorganise their access structures …

[PDF][PDF] The emergence of a national eID solution–an actor-network perspective

F Söderström, U Melin - The 35th Information Systems Research …, 2012 - researchgate.net
This paper will focus on the emergence of the Swedish National Electronic Identification
(eID) from an Actor-Network perspective. As being a significant part of the public sectors …

Identity Management for Health Professionals: A Method for the Integration of Responsibility, Organization, and IT

P Rohner - Business & Information Systems Engineering, 2013 - Springer
As a result of growing economic pressures, collaborations and process orientation are
rapidly gaining importance for hospitals. With organisation and software landscapes which …

Different approaches to in-house identity management-justification of an assumption

L Fuchs, C Broser, G Pernul - 2009 international conference on …, 2009 - ieeexplore.ieee.org
The use of roles in identity management infrastructures (IdMI) has proven to be a solution for
reorganising and securing access structures of employees. The definition of enterprise-wide …