Observations on the role life-cycle in the context of enterprise security management
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Essential System Administration
Essential System Administration
Understanding and Using Context
Personal and Ubiquitous Computing
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Role mining - revealing business roles for security administration using data mining technology
Proceedings of the eighth ACM symposium on Access control models and technologies
Modular authorization and administration
ACM Transactions on Information and System Security (TISSEC)
Personalization technologies: a process-oriented perspective
Communications of the ACM - The digital society
An operational definition of context
CONTEXT'07 Proceedings of the 6th international and interdisciplinary conference on Modeling and using context
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I
Hi-index | 0.00 |
Individualization is an enhancement of existing role concepts by subjective information demand. Role concepts, which belong to personalization, grant access to IT resources. This paper prepares the ground for a context-based approach that provides individual - as opposed to personalized - access to IT resources in heteroge-neous system landscapes. A central part of such an approach is the definition of user context. Here, we provide such a definition, derived from the state of the art in this field, along with a UML class model. Our definition of user context is validated by relating the UML context model to the authorization concepts of SAP R/3, AIX and Solaris.