Roles in information security - A survey and classification of the research area
نویسندگان
چکیده
Since the publication of a seminal paper on “RBAC – role based access control models” in 1996 (IEEE Computer) a huge amount of work has been published on the application of sociological role theory in Information Security. Theoretical role models and interpretations as well as several commercial products are for instance based on the role concept and use them as their underlying access control paradigm. A conducted scientific literature collection revealed 866 publications dealing with roles in the context of Information Security. Although there is an ANSI/NIST standard and an ISO standard proposal there are a variety of competing models and application scenarios available and based on their different concepts and interpretations there is lack of consensus and clarity. Additionally, in practice several interpretations of the role concept have developed, dealing with the usage of theoretical findings on roles to improve existing security technologies. Because of the current situation there is need for a comprehensive article surveying the different proposals and streams of research on roles in Information Security. The goal and major contribution of this survey are a categorization of existing research into different classes following a three-level classification methodology. Based on a well-defined methodology a general categorization of the complete underlying set of publications, including general statistical data is provided. The main part of the work is investigating 30 identified research directions, evaluating their importance, and analyzing research tendencies and trends. An electronic bibliography including all surveyed publications together with the classification information is provided additionally. As a final contribution of the paper future trends in the area of role -research based on the data collected and own personal interpretations are predicted.
منابع مشابه
Author's personal copy Roles in information security e A survey and classification of the research area
The concept of roles has been prevalent in the area of Information Security for more than 15 years already. It promises simplified and flexible user management, reduced administrative costs, improved security, as well as the integration of employees’ business functions into the IT administration. A comprehensive scientific literature collection revealed more than 1300 publications dealing with ...
متن کاملRoles in information security e A survey and classification of the research area
The concept of roles has been prevalent in the area of Information Security for more than 15 years already. It promises simplified and flexible user management, reduced administrative costs, improved security, as well as the integration of employees’ business functions into the IT administration. A comprehensive scientific literature collection revealed more than 1300 publications dealing with ...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملتعیین میزان تحقق شاخصهای مدیریت بومی در کتابخانههای عمومی استان مرکزی
Purpose: This research investigates native management in public libraries of the Markazi Province. Management roles are investigated in three main parameters and ten sub- parameters. The main parameters are: communication, information, and decision making roles. Methodology: The study adopted an analyitical survey. Data were gathered using a self-developed questionnaire with the reliabil...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 30 شماره
صفحات -
تاریخ انتشار 2011