Break-Glass pp 37-50 | Cite as

A Generic Break-Glass Model

  • Helmut PetritschEmail author


Our contributions are presented along the life cycle of a Break-Glass access as depicted in Figure 3.1: the Chapters 4-6, where the pre-, at-, and post-access phases of Break-Glass are presented, are based on our Break-Glass model presented in this chapter. In section 3.1, we will discuss the requirements constituting the characteristics of Break-Glass. Throughout the thesis, we will show how those requirements can be implemented. We will introduce our abstract Break-Glass model in section 3.2. The abstract model will be instantiated with two implementations: the core Break-Glass model in section 3.3 is based on our publication [27] and defines privileges only with positive, i. e., PERMIT, permissions; and the constraints Break-Glass model in section 3.4 which also allows to define constraining, i. e., DENY, permissions.


Abstract Model Core Model Constraint Model Exceptional Situation Policy Enforcement Point 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Fachmedien Wiesbaden 2014

Authors and Affiliations

  1. 1.Strategic Customer EngagementSAP AGWalldorfGermany

Personalised recommendations