{"id":"https://openalex.org/W5444950","doi":"https://doi.org/10.1007/978-0-387-79026-8_16","title":"Automating Identity Management and Access Control","display_name":"Automating Identity Management and Access Control","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W5444950","doi":"https://doi.org/10.1007/978-0-387-79026-8_16","mag":"5444950"},"language":"en","primary_location":{"id":"doi:10.1007/978-0-387-79026-8_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-79026-8_16","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-79026-8_16.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Future of Identity in the Information Society","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-79026-8_16.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076980921","display_name":"Rieks Joosten","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rieks Joosten","raw_affiliation_strings":["TNO Information and Communication Technology, P.O. Box 1416, 9701 BK, Groningen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"TNO Information and Communication Technology, P.O. Box 1416, 9701 BK, Groningen, The Netherlands","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023880056","display_name":"Stef Joosten","orcid":"https://orcid.org/0000-0001-8308-0189"},"institutions":[{"id":"https://openalex.org/I7876267","display_name":"Open University of the Netherlands","ror":"https://ror.org/018dfmf50","country_code":"NL","type":"education","lineage":["https://openalex.org/I7876267"]},{"id":"https://openalex.org/I4210102192","display_name":"Nieuwegein Fonds","ror":"https://ror.org/017cm0005","country_code":"NL","type":"nonprofit","lineage":["https://openalex.org/I4210102192"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Stef Joosten","raw_affiliation_strings":["Open University of the Netherlands, P.O. Box 2960, 6401 DL, Heerlen, The Netherlands","Ordina B&E Solutions, P.O. Box 7101, 3430 JC, Nieuwegein, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Open University of the Netherlands, P.O. Box 2960, 6401 DL, Heerlen, The Netherlands","institution_ids":["https://openalex.org/I7876267"]},{"raw_affiliation_string":"Ordina B&E Solutions, P.O. Box 7101, 3430 JC, Nieuwegein, The Netherlands","institution_ids":["https://openalex.org/I4210102192"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076980921"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00098608,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"235","last_page":"243"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11010","display_name":"Logic, Reasoning, and Knowledge","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6709467172622681},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.6559423208236694},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6465663313865662},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6001027822494507},{"id":"https://openalex.org/keywords/business-rule","display_name":"Business rule","score":0.580471396446228},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5726359486579895},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5559925436973572},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.5398008823394775},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.5310497879981995},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5273146033287048},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4875149428844452},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4642316699028015},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4636913537979126},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4543946087360382},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3729308545589447},{"id":"https://openalex.org/keywords/business-process","display_name":"Business process","score":0.280728816986084},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.24779310822486877},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17060118913650513},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16764730215072632},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12762436270713806},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.121224045753479},{"id":"https://openalex.org/keywords/work-in-process","display_name":"Work in process","score":0.09781727194786072},{"id":"https://openalex.org/keywords/operations-management","display_name":"Operations management","score":0.09462174773216248}],"concepts":[{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6709467172622681},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.6559423208236694},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6465663313865662},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6001027822494507},{"id":"https://openalex.org/C11066294","wikidata":"https://www.wikidata.org/wiki/Q1518244","display_name":"Business rule","level":4,"score":0.580471396446228},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5726359486579895},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5559925436973572},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.5398008823394775},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.5310497879981995},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5273146033287048},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4875149428844452},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4642316699028015},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4636913537979126},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4543946087360382},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3729308545589447},{"id":"https://openalex.org/C85345410","wikidata":"https://www.wikidata.org/wiki/Q851587","display_name":"Business process","level":3,"score":0.280728816986084},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.24779310822486877},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17060118913650513},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16764730215072632},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12762436270713806},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.121224045753479},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.09781727194786072},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.09462174773216248},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-0-387-79026-8_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-79026-8_16","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-79026-8_16.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Future of Identity in the Information Society","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-0-387-79026-8_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-79026-8_16","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-79026-8_16.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Future of Identity in the Information Society","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W5444950.pdf","grobid_xml":"https://content.openalex.org/works/W5444950.grobid-xml"},"referenced_works_count":4,"referenced_works":["https://openalex.org/W7369517","https://openalex.org/W2101449256","https://openalex.org/W4252056968","https://openalex.org/W6628107726"],"related_works":["https://openalex.org/W2357256365","https://openalex.org/W2348502264","https://openalex.org/W2365486383","https://openalex.org/W2362059367","https://openalex.org/W2372124560","https://openalex.org/W2901443725","https://openalex.org/W2350084742","https://openalex.org/W4391222116","https://openalex.org/W4390678258","https://openalex.org/W2296702370"],"abstract_inverted_index":{"The":[0],"problem":[1],"that":[2,58,106],"we":[3],"address":[4],"is":[5,114],"the":[6,82,89,96,104,115],"inability":[7],"of":[8,43,74,86,117],"businesses":[9],"to":[10,69,80,103,111,124,139],"correctly":[11],"and":[12,20,126],"completely":[13],"specify":[14],"what":[15],"an":[16],"automated":[17],"Identity":[18],"Management":[19],"Access":[21],"Control":[22],"(IMAC)":[23],"solution":[24],"must":[25],"do":[26],"within":[27],"their":[28],"organisation.":[29],"This":[30,63],"paper":[31],"reports":[32],"on":[33],"experiments":[34],"with":[35,71],"a":[36,40,47,55,66,93,122,132],"tool":[37,64],"that,":[38],"from":[39],"given":[41],"set":[42,85],"business":[44,67,90,105],"rules,":[45],"generates":[46],"functional":[48],"specification":[49],"as":[50,52,79],"well":[51],"code":[53],"for":[54,88],"software":[56,98],"component":[57,99],"provably":[59],"enforces":[60],"each":[61],"rule.":[62],"allows":[65],"architect":[68],"experiment":[70],"different":[72],"sets":[73],"IMAC":[75,128],"rules":[76,87],"(policies)":[77],"so":[78],"find":[81],"most":[83],"appropriate":[84],"context.":[91],"Creating":[92],"demo":[94],"around":[95],"generated":[97],"provides":[100,121],"hands-on":[101],"proof":[102],"they":[107],"can":[108],"understand.":[109],"New":[110],"our":[112],"work":[113],"use":[116],"relation":[118],"algebra,":[119],"which":[120],"way":[123],"build":[125],"prove":[127],"policies":[129],"simultaneously.":[130],"On":[131],"larger":[133],"scale,":[134],"this":[135],"approach":[136],"may":[137],"help":[138],"solve":[140],"cross-domain":[141],"identity":[142],"issues":[143],"e.g.":[144],"between":[145],"governmental":[146],"organizations.":[147]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
