{"title":"基于访问智能的权限路径分析","authors":"D. Sturm, A. Kern","doi":"10.1145/2462410.2462432","DOIUrl":null,"url":null,"abstract":"The current Idintity and Access Management (IAM) landscape mainly consists of classic Identity Management (IdM) and business-oriented Access Governance. IdM focuses more on providing a single point of administration and provisioning users with the needed access rights. In contrast, Access Governance concentrates on integrating business departments in the assignment and controlling of access rights in the organisation. It therefore provides functions like access request and approval workflows and access certification processes. In addition, the demand to analyse access right structures to cover compliance requirements increases. We therefore use a business intelligence (BI) based approach to complement the current IAM landscape with comprehensive and powerful analysis capabilities. We see the following additional values in providing a separate Access Intelligence system: Using a BI system allows us to convert the access data into a format which allows flexible and fast analytics. We can fulfil the demand of many organisations to separate their operative access control systems and the analytics system.\n Using the well-known capabilities of a BI system, new analyses are provided. One example is the permission path analysis. It divides complex access structures into single paths and thereby lays the foundation for effective access right analyses. In this paper we present the permission path analysis and describe two evaluations based on it.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"24 1","pages":"253-256"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Permission path analysis based on access intelligence\",\"authors\":\"D. Sturm, A. Kern\",\"doi\":\"10.1145/2462410.2462432\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The current Idintity and Access Management (IAM) landscape mainly consists of classic Identity Management (IdM) and business-oriented Access Governance. IdM focuses more on providing a single point of administration and provisioning users with the needed access rights. In contrast, Access Governance concentrates on integrating business departments in the assignment and controlling of access rights in the organisation. It therefore provides functions like access request and approval workflows and access certification processes. In addition, the demand to analyse access right structures to cover compliance requirements increases. We therefore use a business intelligence (BI) based approach to complement the current IAM landscape with comprehensive and powerful analysis capabilities. We see the following additional values in providing a separate Access Intelligence system: Using a BI system allows us to convert the access data into a format which allows flexible and fast analytics. We can fulfil the demand of many organisations to separate their operative access control systems and the analytics system.\\n Using the well-known capabilities of a BI system, new analyses are provided. One example is the permission path analysis. It divides complex access structures into single paths and thereby lays the foundation for effective access right analyses. In this paper we present the permission path analysis and describe two evaluations based on it.\",\"PeriodicalId\":74509,\"journal\":{\"name\":\"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies\",\"volume\":\"24 1\",\"pages\":\"253-256\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2462410.2462432\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2462410.2462432","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Permission path analysis based on access intelligence
The current Idintity and Access Management (IAM) landscape mainly consists of classic Identity Management (IdM) and business-oriented Access Governance. IdM focuses more on providing a single point of administration and provisioning users with the needed access rights. In contrast, Access Governance concentrates on integrating business departments in the assignment and controlling of access rights in the organisation. It therefore provides functions like access request and approval workflows and access certification processes. In addition, the demand to analyse access right structures to cover compliance requirements increases. We therefore use a business intelligence (BI) based approach to complement the current IAM landscape with comprehensive and powerful analysis capabilities. We see the following additional values in providing a separate Access Intelligence system: Using a BI system allows us to convert the access data into a format which allows flexible and fast analytics. We can fulfil the demand of many organisations to separate their operative access control systems and the analytics system.
Using the well-known capabilities of a BI system, new analyses are provided. One example is the permission path analysis. It divides complex access structures into single paths and thereby lays the foundation for effective access right analyses. In this paper we present the permission path analysis and describe two evaluations based on it.