Advertisement

Introduction

  • Helmut Petritsch
Chapter

Abstract

Information Technology (IT) systems comprise fine-grained Access Control (AC) mechanisms, commonly following the least privilege principle [93]: restricting privileges of users to what is needed to fulfill their tasks. AC policies are machine readable rules used to enforce those privileges at runtime. Hence, for the definition of policies, all processes and scenarios which make up the benefit of the IT system have to be modeled in order to be able to define machine readable and enforceable policies. Thus, policies have to be defined beforehand in machine readable form and remain static at runtime.

Keywords

Access Control Regular Case Exception Mechanism Exceptional Situation Machine Readable Form 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Fachmedien Wiesbaden 2014

Authors and Affiliations

  1. 1.Strategic Customer EngagementSAP AGWalldorfGermany

Personalised recommendations