{"id":"https://openalex.org/W1991279991","doi":"https://doi.org/10.1145/2462410.2462432","title":"Permission path analysis based on access intelligence","display_name":"Permission path analysis based on access intelligence","publication_year":2013,"publication_date":"2013-06-05","ids":{"openalex":"https://openalex.org/W1991279991","doi":"https://doi.org/10.1145/2462410.2462432","mag":"1991279991"},"language":"en","primary_location":{"id":"doi:10.1145/2462410.2462432","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462410.2462432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011489409","display_name":"D. Sturm","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087817","display_name":"Software (Germany)","ror":"https://ror.org/004g36n56","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210087817"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Detlef Sturm","raw_affiliation_strings":["Beta Systems Software AG, K\u00f6ln, Germany"],"affiliations":[{"raw_affiliation_string":"Beta Systems Software AG, K\u00f6ln, Germany","institution_ids":["https://openalex.org/I4210087817"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030229706","display_name":"Axel Kern","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087817","display_name":"Software (Germany)","ror":"https://ror.org/004g36n56","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210087817"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Axel Kern","raw_affiliation_strings":["Beta Systems Software AG, K\u00f6ln, Germany"],"affiliations":[{"raw_affiliation_string":"Beta Systems Software AG, K\u00f6ln, Germany","institution_ids":["https://openalex.org/I4210087817"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011489409"],"corresponding_institution_ids":["https://openalex.org/I4210087817"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.17312597,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"253","last_page":"256"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9648000001907349,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13364","display_name":"Digitalization, Law, and Regulation","score":0.9067000150680542,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.752113938331604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6808991432189941},{"id":"https://openalex.org/keywords/access-management","display_name":"Access management","score":0.6666887998580933},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.5740825533866882},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.5416998267173767},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5358172059059143},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.5334240198135376},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5302842259407043},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.4880605936050415},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.474972665309906},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4714459180831909},{"id":"https://openalex.org/keywords/business-intelligence","display_name":"Business intelligence","score":0.4557591676712036},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4549105763435364},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.43982699513435364},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.42438846826553345},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.2653430700302124},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.23996540904045105},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2170187532901764},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16510891914367676}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.752113938331604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6808991432189941},{"id":"https://openalex.org/C2778002324","wikidata":"https://www.wikidata.org/wiki/Q4488810","display_name":"Access management","level":2,"score":0.6666887998580933},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5740825533866882},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.5416998267173767},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5358172059059143},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.5334240198135376},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5302842259407043},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.4880605936050415},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.474972665309906},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4714459180831909},{"id":"https://openalex.org/C2767350","wikidata":"https://www.wikidata.org/wiki/Q6662173","display_name":"Business intelligence","level":2,"score":0.4557591676712036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4549105763435364},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.43982699513435364},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.42438846826553345},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2653430700302124},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.23996540904045105},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2170187532901764},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16510891914367676},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2462410.2462432","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462410.2462432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4310934770","https://openalex.org/W2614795314","https://openalex.org/W2094052616","https://openalex.org/W1564746865","https://openalex.org/W1596015467","https://openalex.org/W4390678258","https://openalex.org/W4323054502","https://openalex.org/W3099589125","https://openalex.org/W1911959624","https://openalex.org/W1970108362"],"abstract_inverted_index":{"The":[0],"current":[1,97],"Idintity":[2],"and":[3,15,29,49,64,67,102,136,154],"Access":[4,17,39,116],"Management":[5,13],"(IAM)":[6],"landscape":[7,99],"mainly":[8],"consists":[9],"of":[10,27,51,144],"classic":[11],"Identity":[12],"(IdM)":[14],"business-oriented":[16],"Governance.":[18],"IdM":[19],"focuses":[20],"more":[21],"on":[22,42],"providing":[23,113],"a":[24,88,114,120,131],"single":[25],"point":[26],"administration":[28],"provisioning":[30],"users":[31],"with":[32,100],"the":[33,47,55,73,96,108,127,142,155],"needed":[34],"access":[35,52,62,68,77,128,151],"rights.":[36],"In":[37,71],"contrast,":[38],"Governance":[40],"concentrates":[41],"integrating":[43],"business":[44,89],"departments":[45],"in":[46,54,112],"assignment":[48],"controlling":[50],"rights":[53],"organisation.":[56],"It":[57],"therefore":[58,86],"provides":[59],"functions":[60],"like":[61],"request":[63],"approval":[65],"workflows":[66],"certification":[69],"processes.":[70],"addition,":[72],"demand":[74,143],"to":[75,80,94,125,147],"analyse":[76],"right":[78],"structures":[79],"cover":[81],"compliance":[82],"requirements":[83],"increases.":[84],"We":[85,106,139],"use":[87],"intelligence":[90],"(BI)":[91],"based":[92],"approach":[93],"complement":[95],"IAM":[98],"comprehensive":[101],"powerful":[103],"analysis":[104],"capabilities.":[105],"see":[107],"following":[109],"additional":[110],"values":[111],"separate":[115,148],"Intelligence":[117],"system:":[118],"Using":[119],"BI":[121],"system":[122],"allows":[123,134],"us":[124],"convert":[126],"data":[129],"into":[130],"format":[132],"which":[133],"flexible":[135],"fast":[137],"analytics.":[138],"can":[140],"fulfil":[141],"many":[145],"organisations":[146],"their":[149],"operative":[150],"control":[152],"systems":[153],"analytics":[156],"system.":[157]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
