Permission path analysis based on access intelligence

D. Sturm, A. Kern
{"title":"Permission path analysis based on access intelligence","authors":"D. Sturm, A. Kern","doi":"10.1145/2462410.2462432","DOIUrl":null,"url":null,"abstract":"The current Idintity and Access Management (IAM) landscape mainly consists of classic Identity Management (IdM) and business-oriented Access Governance. IdM focuses more on providing a single point of administration and provisioning users with the needed access rights. In contrast, Access Governance concentrates on integrating business departments in the assignment and controlling of access rights in the organisation. It therefore provides functions like access request and approval workflows and access certification processes. In addition, the demand to analyse access right structures to cover compliance requirements increases. We therefore use a business intelligence (BI) based approach to complement the current IAM landscape with comprehensive and powerful analysis capabilities. We see the following additional values in providing a separate Access Intelligence system: Using a BI system allows us to convert the access data into a format which allows flexible and fast analytics. We can fulfil the demand of many organisations to separate their operative access control systems and the analytics system.\n Using the well-known capabilities of a BI system, new analyses are provided. One example is the permission path analysis. It divides complex access structures into single paths and thereby lays the foundation for effective access right analyses. In this paper we present the permission path analysis and describe two evaluations based on it.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"24 1","pages":"253-256"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2462410.2462432","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The current Idintity and Access Management (IAM) landscape mainly consists of classic Identity Management (IdM) and business-oriented Access Governance. IdM focuses more on providing a single point of administration and provisioning users with the needed access rights. In contrast, Access Governance concentrates on integrating business departments in the assignment and controlling of access rights in the organisation. It therefore provides functions like access request and approval workflows and access certification processes. In addition, the demand to analyse access right structures to cover compliance requirements increases. We therefore use a business intelligence (BI) based approach to complement the current IAM landscape with comprehensive and powerful analysis capabilities. We see the following additional values in providing a separate Access Intelligence system: Using a BI system allows us to convert the access data into a format which allows flexible and fast analytics. We can fulfil the demand of many organisations to separate their operative access control systems and the analytics system. Using the well-known capabilities of a BI system, new analyses are provided. One example is the permission path analysis. It divides complex access structures into single paths and thereby lays the foundation for effective access right analyses. In this paper we present the permission path analysis and describe two evaluations based on it.
基于访问智能的权限路径分析
当前的身份和访问管理(IAM)主要由经典的身份管理(IdM)和面向业务的访问治理组成。IdM更侧重于提供单点管理并为用户提供所需的访问权限。相比之下,访问治理集中于将业务部门集成到组织中的访问权限分配和控制中。因此,它提供了访问请求和批准工作流以及访问认证流程等功能。此外,分析访问权限结构以涵盖合规要求的需求也在增加。因此,我们使用基于商业智能(BI)的方法,以全面而强大的分析能力补充当前的IAM环境。在提供单独的访问智能系统中,我们看到了以下附加价值:使用BI系统允许我们将访问数据转换为允许灵活快速分析的格式。我们可以满足许多机构将其操作访问控制系统和分析系统分开的需求。利用BI系统众所周知的功能,提供了新的分析。权限路径分析就是一个例子。它将复杂的访问结构划分为单个路径,从而为有效的访问权限分析奠定了基础。本文提出了权限路径分析,并在此基础上描述了两种评估方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信