Items related to Methodology for Hybrid Role Development

Methodology for Hybrid Role Development - Softcover

 
9783899369786: Methodology for Hybrid Role Development
View all copies of this ISBN edition:
 
 
"Cybercrime costs firms USD 1 trillion globally" - Headlines like this released by Reuters news agency on 29th January 2009 tend to regularly dominate international press lately. Surveys indicate that insiders like employees are one of the biggest threats to data security within organisations. As a result of improper account management users accumulate a number of excessive rights over time, resulting in the so called identity chaos. In the course of constantly growing IT infrastructures on the one hand, as well as the legislative regulations and law on the other hand, role-based Identity Management in particular has become a means of solving the identity chaos and meeting data security requirements. However, the central challenge organisations face in this context is how to construct a role catalogue for their Identity Management infrastructure. Some companies deal with this issue by applying predominantly manual procedures based on organisational and operational structures. These approaches are known as Role Engineering methodologies. Throughout the last few years, so-called Role Mining methodologies which use Data Mining techniques that cluster existing access rights of employees have evolved as alternative approaches. Recent findings show that a combination of Role Engineering and Role Mining is necessary to define a good collection of roles. This book gives insight into a hybrid tool-supported methodology for cleansing identity and account data and developing business roles for employees using Role Engineering and Role Mining techniques. Its main goals are to increase the overall user management data quality and support companies throughout a semi-automated process of defining roles. The methodology considers existing employee information and access privileges without neglecting organisational structures and business experts' knowledge about the organisation.

"synopsis" may belong to another edition of this title.

About the Author:
Ludwig Fuchs studied Business Information Systems at the University of Regensburg, Germany and completed his diploma degree in 2005. During his courses he studied at the Department of Computer Science and the Department of Management Studies at the University of York (UK). After graduation, he lectured and researched at the Department of Information Systems at the University of Regensburg with Prof. Dr. Gunther Pernul and at the University of Texas in San Antonio (USA) together with Prof. Dr. Ravi Sandhu. He received his doctoral degree in 2009 (Dr. rer. pol.).

"About this title" may belong to another edition of this title.

  • PublisherJosef Eul Verlag Gmbh
  • Publication date2010
  • ISBN 10 3899369785
  • ISBN 13 9783899369786
  • BindingPaperback
  • Number of pages274

Shipping: £ 19.71
From Germany to U.S.A.

Destination, rates & speeds

Add to Basket

Top Search Results from the AbeBooks Marketplace

Seller Image

Ludwig Fuchs
ISBN 10: 3899369785 ISBN 13: 9783899369786
New Taschenbuch Quantity: 2
Print on Demand
Seller:
BuchWeltWeit Ludwig Meier e.K.
(Bergisch Gladbach, Germany)

Book Description Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -¿Cybercrime costs firms USD 1 trillion globally¿ ¿ Headlines like this released by Reuters news agency on 29th January 2009 tend to regularly dominate international press lately. Surveys indicate that insiders like employees are one of the biggest threats to data security within organisations. As a result of improper account management users accumulate a number of excessive rights over time, resulting in the so called identity chaos. In the course of constantly growing IT infrastructures on the one hand, as well as the legislative regulations and law on the other hand, role-based Identity Management in particular has become a means of solving the identity chaos and meeting data security requirements. However, the central challenge organisations face in this context is how to construct a role catalogue for their Identity Management infrastructure. Some companies deal with this issue by applying predominantly manual procedures based on organisational and operational structures. These approaches are known as Role Engineering methodologies. Throughout the last few years, so-called Role Mining methodologies which use Data Mining techniques that cluster existing access rights of employees have evolved as alternative approaches. Recent findings show that a combination of Role Engineering and Role Mining is necessary to define a good collection of roles. This book gives insight into a hybrid tool-supported methodology for cleansing identity and account data and developing business roles for employees using Role Engineering and Role Mining techniques. Its main goals are to increase the overall user management data quality and support companies throughout a semi-automated process of defining roles. The methodology considers existing employee information and access privileges without neglecting organisational structures and business experts¿ knowledge about the organisation. 272 pp. Englisch. Seller Inventory # 9783899369786

More information about this seller | Contact seller

Buy New
£ 51.20
Convert currency

Add to Basket

Shipping: £ 19.71
From Germany to U.S.A.
Destination, rates & speeds
Stock Image

Fuchs, Ludwig
Published by Josef Eul Verlag Gmbh (2010)
ISBN 10: 3899369785 ISBN 13: 9783899369786
New Softcover Quantity: > 20
Seller:
Lucky's Textbooks
(Dallas, TX, U.S.A.)

Book Description Condition: New. Seller Inventory # ABLING22Oct2817100635249

More information about this seller | Contact seller

Buy New
£ 69.47
Convert currency

Add to Basket

Shipping: £ 3.16
Within U.S.A.
Destination, rates & speeds
Stock Image

Fuchs, Ludwig
Published by Josef Eul Verlag Gmbh (2010)
ISBN 10: 3899369785 ISBN 13: 9783899369786
New PAP Quantity: 15
Print on Demand
Seller:
PBShop.store US
(Wood Dale, IL, U.S.A.)

Book Description PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9783899369786

More information about this seller | Contact seller

Buy New
£ 72.74
Convert currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, rates & speeds
Seller Image

Ludwig Fuchs
Published by Josef Eul Verlag Gmbh (2010)
ISBN 10: 3899369785 ISBN 13: 9783899369786
New Taschenbuch Quantity: 1
Print on Demand
Seller:
AHA-BUCH GmbH
(Einbeck, Germany)

Book Description Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - ¿Cybercrime costs firms USD 1 trillion globally¿ ¿ Headlines like this released by Reuters news agency on 29th January 2009 tend to regularly dominate international press lately. Surveys indicate that insiders like employees are one of the biggest threats to data security within organisations. As a result of improper account management users accumulate a number of excessive rights over time, resulting in the so called identity chaos. In the course of constantly growing IT infrastructures on the one hand, as well as the legislative regulations and law on the other hand, role-based Identity Management in particular has become a means of solving the identity chaos and meeting data security requirements. However, the central challenge organisations face in this context is how to construct a role catalogue for their Identity Management infrastructure. Some companies deal with this issue by applying predominantly manual procedures based on organisational and operational structures. These approaches are known as Role Engineering methodologies. Throughout the last few years, so-called Role Mining methodologies which use Data Mining techniques that cluster existing access rights of employees have evolved as alternative approaches. Recent findings show that a combination of Role Engineering and Role Mining is necessary to define a good collection of roles. This book gives insight into a hybrid tool-supported methodology for cleansing identity and account data and developing business roles for employees using Role Engineering and Role Mining techniques. Its main goals are to increase the overall user management data quality and support companies throughout a semi-automated process of defining roles. The methodology considers existing employee information and access privileges without neglecting organisational structures and business experts¿ knowledge about the organisation. Seller Inventory # 9783899369786

More information about this seller | Contact seller

Buy New
£ 51.20
Convert currency

Add to Basket

Shipping: £ 28.27
From Germany to U.S.A.
Destination, rates & speeds
Stock Image

Fuchs, Ludwig
Published by Josef Eul Verlag Gmbh (2010)
ISBN 10: 3899369785 ISBN 13: 9783899369786
New PAP Quantity: 15
Print on Demand
Seller:
PBShop.store UK
(Fairford, GLOS, United Kingdom)

Book Description PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9783899369786

More information about this seller | Contact seller

Buy New
£ 66.68
Convert currency

Add to Basket

Shipping: £ 25
From United Kingdom to U.S.A.
Destination, rates & speeds
Seller Image

Fuchs, Ludwig
Published by Eul, Josef, Verlag GmbH (2010)
ISBN 10: 3899369785 ISBN 13: 9783899369786
New Softcover Quantity: > 20
Print on Demand
Seller:
moluna
(Greven, Germany)

Book Description Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. &Uumlber den AutorLudwig Fuchs studied Business Information Systems at the University of Regensburg, Germany and completed his diploma degree in 2005. During his courses he studied at the Department of Computer Science and the Departmen. Seller Inventory # 5657794

More information about this seller | Contact seller

Buy New
£ 51.20
Convert currency

Add to Basket

Shipping: £ 41.98
From Germany to U.S.A.
Destination, rates & speeds