{"id":"https://openalex.org/W2275617168","doi":"https://doi.org/10.5220/0005232100640072","title":"Analyzing Quality Criteria in Role-based Identity and Access Management","display_name":"Analyzing Quality Criteria in Role-based Identity and Access Management","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2275617168","doi":"https://doi.org/10.5220/0005232100640072","mag":"2275617168"},"language":"en","primary_location":{"id":"doi:10.5220/0005232100640072","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005232100640072","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005232100640072","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103760823","display_name":"Michael Kunz","orcid":"https://orcid.org/0009-0001-5459-8867"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Michael Kunz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109088862","display_name":"Ludwig Fuchs","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ludwig Fuchs","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086903657","display_name":"Michael Netter","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michael Netter","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5068820890","display_name":"G\u00fcnther Pernul","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G\u00fcnther Pernul","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103760823"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.2996,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.94724527,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"64","last_page":"72"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.6931523680686951},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6226206421852112},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.60014808177948},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.5320820808410645},{"id":"https://openalex.org/keywords/access-management","display_name":"Access management","score":0.41763514280319214},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30386653542518616},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.29832348227500916},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15524712204933167},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.09974804520606995}],"concepts":[{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.6931523680686951},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6226206421852112},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.60014808177948},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.5320820808410645},{"id":"https://openalex.org/C2778002324","wikidata":"https://www.wikidata.org/wiki/Q4488810","display_name":"Access management","level":2,"score":0.41763514280319214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30386653542518616},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.29832348227500916},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15524712204933167},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.09974804520606995},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0005232100640072","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005232100640072","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:epub.uni-regensburg.de:31342","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401229","display_name":"University of Regensburg Publication Server (University of Regensburg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60668342","host_organization_name":"University of Regensburg","host_organization_lineage":["https://openalex.org/I60668342"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"doi:10.5220/0005232100640072","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005232100640072","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W88348902","https://openalex.org/W149396756","https://openalex.org/W157251712","https://openalex.org/W184351513","https://openalex.org/W299491630","https://openalex.org/W376985133","https://openalex.org/W1554638356","https://openalex.org/W1556428680","https://openalex.org/W1560388458","https://openalex.org/W1561412617","https://openalex.org/W1655086549","https://openalex.org/W1856557761","https://openalex.org/W1953294450","https://openalex.org/W1966616869","https://openalex.org/W1968110920","https://openalex.org/W1974136169","https://openalex.org/W1974885403","https://openalex.org/W1975960070","https://openalex.org/W1980400728","https://openalex.org/W1981986848","https://openalex.org/W1986294018","https://openalex.org/W1987823353","https://openalex.org/W1988190983","https://openalex.org/W1989299447","https://openalex.org/W1995281361","https://openalex.org/W2008138206","https://openalex.org/W2018616316","https://openalex.org/W2027426835","https://openalex.org/W2034339209","https://openalex.org/W2054075152","https://openalex.org/W2066127983","https://openalex.org/W2078074581","https://openalex.org/W2098809455","https://openalex.org/W2102265799","https://openalex.org/W2107801860","https://openalex.org/W2113204065","https://openalex.org/W2114555853","https://openalex.org/W2119703684","https://openalex.org/W2124975206","https://openalex.org/W2131782448","https://openalex.org/W2133523155","https://openalex.org/W2134533383","https://openalex.org/W2137577559","https://openalex.org/W2138683527","https://openalex.org/W2141752622","https://openalex.org/W2145240016","https://openalex.org/W2148548837","https://openalex.org/W2149816156","https://openalex.org/W2154537314","https://openalex.org/W2156015700","https://openalex.org/W2158934828","https://openalex.org/W2161358272","https://openalex.org/W2162039156","https://openalex.org/W2163328802","https://openalex.org/W2163502178","https://openalex.org/W2166559705","https://openalex.org/W2166602595","https://openalex.org/W2554578733","https://openalex.org/W3144523882","https://openalex.org/W3204447077"],"related_works":["https://openalex.org/W4310934770","https://openalex.org/W2614795314","https://openalex.org/W4313185140","https://openalex.org/W4252422028","https://openalex.org/W2124644269","https://openalex.org/W2501813002","https://openalex.org/W1564746865","https://openalex.org/W4220879304","https://openalex.org/W3121498974","https://openalex.org/W4238930562"],"abstract_inverted_index":{"Roles":[0],"have":[1],"turned":[2],"into":[3],"the":[4,35,40,79,98],"de":[5],"facto":[6],"standard":[7],"for":[8,50],"access":[9],"control":[10],"in":[11,105],"enterprise":[12],"identity":[13],"management":[14],"systems.":[15],"However,":[16],"as":[17],"roles":[18],"evolve":[19],"over":[20],"time,":[21],"companies":[22],"struggle":[23],"to":[24,33,96,101],"develop":[25],"and":[26,47],"maintain":[27],"a":[28,44,60,82],"consistent":[29],"role":[30,45,64,83,107],"model.":[31],"Up":[32],"now,":[34],"core":[36],"challenge":[37],"of":[38,43,62,81],"measuring":[39],"current":[41],"quality":[42,68,90,103],"model":[46],"selecting":[48],"criteria":[49,69],"its":[51],"optimization":[52],"remains":[53],"unsolved.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58],"conduct":[59],"survey":[61],"existing":[63],"mining":[65,84,108],"techniques":[66],"and\\nidentify":[67],"inherently":[70],"used":[71],"by":[72],"these":[73],"approaches.":[74,109],"This":[75],"guides":[76],"organizations":[77],"during":[78],"selection":[80],"technique":[85],"that":[86],"matches":[87],"their":[88],"company-specific":[89],"references.":[91],"Moreover,":[92],"our":[93],"analysis":[94],"aims":[95],"stimulate":[97],"research":[99],"community":[100],"integrate":[102],"metrics":[104],"future":[106]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
