Abstract
Information Technology (IT) systems comprise fine-grained Access Control (AC) mechanisms, commonly following the least privilege principle [93]: restricting privileges of users to what is needed to fulfill their tasks. AC policies are machine readable rules used to enforce those privileges at runtime. Hence, for the definition of policies, all processes and scenarios which make up the benefit of the IT system have to be modeled in order to be able to define machine readable and enforceable policies. Thus, policies have to be defined beforehand in machine readable form and remain static at runtime.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Petritsch, H. (2014). Introduction. In: Break-Glass. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-07365-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-658-07365-7_1
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-07364-0
Online ISBN: 978-3-658-07365-7
eBook Packages: Computer ScienceComputer Science (R0)