Methodology for hybrid role development:
Saved in:
Main Author: | |
---|---|
Format: | Thesis/Dissertation Book |
Language: | English |
Published: |
Lohmar [u.a.]
Eul
2010
|
Edition: | 1. Aufl. |
Series: | Reihe: Wirtschaftsinformatik
69 |
Subjects: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020697168&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Physical Description: | XXVI, 246 S. graph. Darst. |
ISBN: | 9783899369786 |
Staff View
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036780503 | ||
003 | DE-604 | ||
005 | 20101126 | ||
007 | t| | ||
008 | 101117s2010 xx d||| m||| 00||| eng d | ||
020 | |a 9783899369786 |9 978-3-89936-978-6 | ||
035 | |a (OCoLC)702646873 | ||
035 | |a (DE-599)BVBBV036780503 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 658.478 |2 22/ger | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
100 | 1 | |a Fuchs, Ludwig |e Verfasser |4 aut | |
245 | 1 | 0 | |a Methodology for hybrid role development |c Ludwig Fuchs |
250 | |a 1. Aufl. | ||
264 | 1 | |a Lohmar [u.a.] |b Eul |c 2010 | |
300 | |a XXVI, 246 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Reihe: Wirtschaftsinformatik |v 69 | |
502 | |a Zugl.: Regensburg, Univ., Diss., 2010 | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 3 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 1 | 1 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 1 | 2 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 1 | 3 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 4 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |C b |5 DE-604 | |
830 | 0 | |a Reihe: Wirtschaftsinformatik |v 69 |w (DE-604)BV004373821 |9 69 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020697168&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020697168 |
Record in the Search Index
_version_ | 1819315069057499136 |
---|---|
adam_text | IMAGE 1
CONTENTS
PREFACE I
CONTENTS XI
LIST OF FIGURES XVII
LIST OF TABLES XXIII
ACRONYMS XXV
1. INTRODUCTION 1
1.1 RESEARCH QUESTIONS 2
1.2 RESEARCH METHODOLOGY 3
1.2.1 RESEARCH PARADIGMS 4
1.2.2 DESIGN RESEARCH 5
1.3 CHAPTER STRUCTURE 7
PART I: MOTIVATION AND FUNDAMENTALS
2. MOTIVATION 13
2.1 INFORMATION SECURITY 14
2.2 THE IDENTITY CHAOS 17
2.3 IDENTITY MANAGEMENT AND ROLES 17
2.4 THE ROLE DEVELOPMENT CHALLENGE 19
3. IDENTITY MANAGEMENT 23
3.1 DEFINING IDENTITY MANAGEMENT 23
3.1.1 TYPES OF IDM 24
3.1.2 IDENTITY MODELS 25
3.1.3 MATURITY LEVEL 28
3.2 IN-HOUSE IDM CHARACTERISTICS 29
3.2.1 PROCESSES AND POLICIES 30
3.2.2 TECHNOLOGIES 31
3.2.3 INTRODUCING N-HOUSE IDM 33
3.3 ROLE-BASED IDENTITY MANAGEMENT 35
3.3.1 APPLICATION AREAS OF ROLES 35
3.3.2 BENEFITS OF ROLE-BASED IDM 36
3.3.3 ROLE SYSTEM DEVELOPMENT 38
3.3.4 THE IDENTITY MANAGEMENT MARKET 39
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1008660337
DIGITALISIERT DURCH
IMAGE 2
X CONTENTS
PART II: RELATED WORK
4. ROLES IN INFORMATION SECURITY 45
4.1 SURVEY OF THE RESEARCH AREA 46
4.1.1 USED METHODOLOGY 46
4.1.2 HISTORY OF ROLES IN INFORMATION SECURITY 49
4.1.3 DEVELOPMENT OF THE RESEARCH AREA 50
4.1.4 RESEARCH DIRECTIONS 51
4.2 EVOLUTION OF A ROLE SYSTEM 54
4.2.1 BASIC ELEMENTS 55
4.2.2 LIFECYCLEOF A ROLE SYSTEM 55
4.3 ROLE MODELS 59
4.3.1 THE RBAC STANDARD ANSI INCITS 359-2004 60
4.3.2 RBAC EXTENSIONS 62
4.3.3 ROLE PROPERTIES 64
4.3.4 ROLE TYPES USED IN IDENTITY MANAGEMENT 66
4.4 ROLE DEVELOPMENT METHODOLOGIES 68
5. COMPARISON OF ROLE DEVELOPMENT METHODOLOGIES 77
5.1 INPUT DATA SOURCES 78
5.1.1 OOS LAYER 78
5.1.2 DIRECTORY LAYER 80
5.2 CLASSIFICATION OF RDMS 81
5.2.1 ROLE ENGINEERING 82
5.2.2 ROLE MINING 84
5.3 COMPARISON 85
5.3.1 METHODOLOGICAL EVALUATION CRITERIA 85
5.3.2 DOMAIN-SPECIFIC EVALUATION CRITERIA 86
5.3.3 BUSINESS-RELATED EVALUATION CRITERIA 87
5.3.4 RESULTS OF THE COMPARISON 88
5.3.5 CONCLUSION 90
PART III: METHODOLOGY AND PROTOTYPE DEVELOPMENT
6. HYDRO METHOD FUNDAMENTALS 95
6.1 METHOD CHARACTERISTICS 95
6.2 METHOD ELEMENTS 97
IMAGE 3
CONTENTS XIII
6.2.1 ROLES 98
6.2.2 META MODEL 100
6.2.3 RESULTS AND SPECIFICATION DOCUMENTS 102
6.2.4 TOOL 103
6.2.5 PROCEDURE MODEL, PHASES, ACTIVITIES, AND TECHNIQUES 104
6.3 DATA ANALYSIS TECHNOLOGIES 105
6.3.1 STATISTICAL ANALYSIS 105
6.3.2 DATA MINING 107
6.3.3 SELF-ORGANISING MAPS 109
7. HYDRO PROCEDURE MODEL 115
7.1 OVERVIEW 115
7.1.1 MODULARISED STRUCTURE 115
7.1.2 KNOWLEDGE GENERATION AND VALIDATION 117
7.1.3 QUALITY MEASUREMENT 118
7.1.4 DATA INTEGRATION 118
7.2 DATA GATHERING 119
7.2.1 DIRECTORY LAYER IMPORT (PLALM) 120
7.2.2 OOS LAYER IMPORT (PLA2O) 122
7.2.3 DEFINE SCOPE AND PARTITION INPUT DATA (PLA3M) 123
7.2.4 QUALITY MEASUREMENT 124
7.3 DATA CLEANSING 124
7.3.1 DETECT SYNTACTIC ERRORS (P2ALM) 125
7.3.2 REVIEW AND CLEANSE (P2A2M) 127
7.3.3 DETECT SEMANTIC ERRORS (P2A3M) 128
7.3.4 PREPARE RESULTS AND CLEANSE DATA (P2A4M) 131
7.3.5 QUALITY MEASUREMENT 132
7.4 DATA PREPARATION AND -SELECTION 133
7.4.1 PERMISSION CLASSIFICATION (P3ALM) 133
7.4.2 EMPLOYEE CLASSIFICATION (P3A2M) 135
7.4.3 DOMAIN EXPERT ASSESSMENT (P3A3M) 140
7.4.4 OHE CLASSIFICATION (P3A4M) 141
7.4.5 DATA SELECTION (P3A5O) 142
7.4.6 QUALITY MEASUREMENT 142
7.5 BASIC ROLE DEVELOPMENT 143
IMAGE 4
XIV
CONTENTS
7.5.1 DISCOVER BRC (P4ALM) 144
7.5.2 DEFINE BASIC ROLES (P4A2M) 145
7.5.3 ALTER ROLE CATALOGUE (P4A3O) 146
7.5.4 QUALITY MEASUREMENT 147
7.6 ORGANISATIONAL ROLE DEVELOPMENT 147
7.6.1 DISCOVER ORC (P5ALM) 148
7.6.2 REFINE ORC (P5A2M) 150
7.6.3 DEFINE ORGANISATIONAL ROLES (P5A3M) 153
7.6.4 ALTER ROLE CATALOGUE (P5A4M) 154
7.6.5 QUALITY MEASUREMENT 155
7.7 FUNCTIONAL ROLE DEVELOPMENT 156
7.7.1 SELECT HIERARCHY ELEMENTS (P6ALM) 157
7.7.2 IDENTIFY TYPE-1 AND TYPE-2 FRC (P6A2M) 158
7.7.3 DEFINE FUNCTIONAL ROLES (P6A3M) 160
7.7.4 ALTER ROLE CATALOGUE (P6A4M) 161
7.7.5 QUALITY MEASUREMENT 162
8. THE CONTROLE TOOL 165
8.1 PROTOTYPE ARCHITECTURE 165
8.2 DATA OBJECT MODEL 167
8.3 USER INTERFACE 169
8.4 CONTROLE APPLICATION LOGIC 170
8.4.1 DATA GATHERING 173
8.4.2 DATA CLEANSING 174
8.4.3 DATA PREPARATION AND -SELECTION 176
8.4.4 BASIC ROLE DEVELOPMENT 177
8.4.5 ORGANISATIONAL ROLE DEVELOPMENT 179
8.4.6 FUNCTIONAL ROLE DEVELOPMENT 180
PART IV: EVALUATION AND FUTURE WORK
9. EVALUATION 183
9.1 APPLICATION SCENARIO HONDO SOLUTIONS 184
9.1.1 DATA GATHERING 185
9.1.2 DATA CLEANSING 187
9.1.3 DATA PREPARATION AND -SELECTION 189
IMAGE 5
CONTENTS XV
9.1.4 BASIC ROLE DEVELOPMENT 193
9.1.5 ORGANISATIONAL ROLE DEVELOPMENT 196
9.1.6 FUNCTIONAL ROLE DEVELOPMENT 199
9.2 APPLICATION SCENARIO SEMICOND 203
9.2.1 DATA GATHERING 203
9.2.2 DATA CLEANSING 204
9.2.3 DATA PREPARATION AND -SELECTION 209
9.2.4 BASIC ROLE DEVELOPMENT 213
9.3 HYDRO COMPARISON 215
10. FUTURE WORK 219
10.1 BROADENING THE SCOPE OF HYDRO 220
10.2 EXTENDED SUPPORT FOR POLICIES AND OPERATIONAL STRUCTURES 222
10.3 CONTROLE EXTENSIONS 223
11. CONCLUSIONS 225
BIBLIOGRAPHY 229
|
any_adam_object | 1 |
author | Fuchs, Ludwig |
author_facet | Fuchs, Ludwig |
author_role | aut |
author_sort | Fuchs, Ludwig |
author_variant | l f lf |
building | Verbundindex |
bvnumber | BV036780503 |
classification_rvk | QP 345 |
ctrlnum | (OCoLC)702646873 (DE-599)BVBBV036780503 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 1. Aufl. |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02179nam a2200541 cb4500</leader><controlfield tag="001">BV036780503</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20101126 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">101117s2010 xx d||| m||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783899369786</subfield><subfield code="9">978-3-89936-978-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)702646873</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036780503</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fuchs, Ludwig</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Methodology for hybrid role development</subfield><subfield code="c">Ludwig Fuchs</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. Aufl.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Lohmar [u.a.]</subfield><subfield code="b">Eul</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVI, 246 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Reihe: Wirtschaftsinformatik</subfield><subfield code="v">69</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Regensburg, Univ., Diss., 2010</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Reihe: Wirtschaftsinformatik</subfield><subfield code="v">69</subfield><subfield code="w">(DE-604)BV004373821</subfield><subfield code="9">69</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020697168&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020697168</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV036780503 |
illustrated | Illustrated |
indexdate | 2024-12-20T14:41:56Z |
institution | BVB |
isbn | 9783899369786 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020697168 |
oclc_num | 702646873 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XXVI, 246 S. graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Eul |
record_format | marc |
series | Reihe: Wirtschaftsinformatik |
series2 | Reihe: Wirtschaftsinformatik |
spellingShingle | Fuchs, Ludwig Methodology for hybrid role development Reihe: Wirtschaftsinformatik Datensicherung (DE-588)4011144-1 gnd Unternehmen (DE-588)4061963-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Informationssystem (DE-588)4072806-7 gnd Identitätsverwaltung (DE-588)7546673-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4061963-1 (DE-588)4293034-0 (DE-588)4072806-7 (DE-588)7546673-9 (DE-588)4113937-9 |
title | Methodology for hybrid role development |
title_auth | Methodology for hybrid role development |
title_exact_search | Methodology for hybrid role development |
title_full | Methodology for hybrid role development Ludwig Fuchs |
title_fullStr | Methodology for hybrid role development Ludwig Fuchs |
title_full_unstemmed | Methodology for hybrid role development Ludwig Fuchs |
title_short | Methodology for hybrid role development |
title_sort | methodology for hybrid role development |
topic | Datensicherung (DE-588)4011144-1 gnd Unternehmen (DE-588)4061963-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Informationssystem (DE-588)4072806-7 gnd Identitätsverwaltung (DE-588)7546673-9 gnd |
topic_facet | Datensicherung Unternehmen Zugriffskontrolle Informationssystem Identitätsverwaltung Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020697168&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV004373821 |
work_keys_str_mv | AT fuchsludwig methodologyforhybridroledevelopment |