{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:21Z","timestamp":1750220361122,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1145\/3465481.3470055","type":"proceedings-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T18:07:25Z","timestamp":1629137245000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Improving Identity and Access Management with the IdMSecMan Process Framework"],"prefix":"10.1145","author":[{"given":"Daniela","family":"P\u00f6hn","sequence":"first","affiliation":[{"name":"Universit\u00e4t der Bundeswehr M\u00fcnchen, DE"}]},{"given":"Sebastian","family":"Seeber","sequence":"additional","affiliation":[{"name":"Universit\u00e4t der Bundeswehr M\u00fcnchen, DE"}]},{"given":"Tanja","family":"Hanauer","sequence":"additional","affiliation":[{"name":"CANCOM SE, DE"}]},{"given":"Jule A.","family":"Ziegler","sequence":"additional","affiliation":[{"name":"Leibniz Supercomputing Centre, DE"}]},{"given":"David","family":"Schmitz","sequence":"additional","affiliation":[{"name":"Leibniz Supercomputing Centre, DE"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Avalanche Technology Group. 2021. BreachAlarm - How Safe Is your Password?Retrieved 2021\/06\/18 08:31:42from https:\/\/breachalarm.com"},{"key":"e_1_3_2_1_2_1","volume-title":"Security Data Visualization","author":"Balaji Balakrishnan","year":"2015","unstructured":"Balaji Balakrishnan 2015. Security Data Visualization. SANS Institute InfoSec Reading Room(2015)."},{"key":"e_1_3_2_1_3_1","volume-title":"Using Modelling and Simulation for Policy Decision Support in Identity Management. In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks. 17\u201324","author":"Baldwin Adrian","year":"2009","unstructured":"Adrian Baldwin, Marco\u00a0Casassa Mont, and Simon Shiu. 2009. Using Modelling and Simulation for Policy Decision Support in Identity Management. In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks. 17\u201324."},{"key":"e_1_3_2_1_4_1","volume-title":"Knowledge Visualization: The Use of Complementary Visual Representations for the Transfer of Knowledge: a Model, a Framework, and Four New Approaches","author":"Burkhard Remo","year":"2005","unstructured":"Remo Burkhard. 2005. Knowledge Visualization: The Use of Complementary Visual Representations for the Transfer of Knowledge: a Model, a Framework, and Four New Approaches. University of St. Gallen (01 2005)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1037443"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2903156"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232855"},{"key":"e_1_3_2_1_10_1","unstructured":"Troy Hunt. 2021. Have I Been Pwned: Check if your email has been compromised in a data breach. Retrieved 2021\/06\/18 08:31:42from https:\/\/haveibeenpwned.com"},{"key":"e_1_3_2_1_11_1","unstructured":"IBM Security. 2020. Designing a modern IAM programm for your business. Whitepaper."},{"key":"e_1_3_2_1_12_1","volume-title":"Information Technology - Security Techniques - Information Security Management Systems \u2013 Requirements (ISO\/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015)","author":"IEC","year":"2017","unstructured":"ISO\/IEC 27001:2017 2017. Information Technology - Security Techniques - Information Security Management Systems \u2013 Requirements (ISO\/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015); German version EN ISO\/IEC 27001:2017. Standard. International Organization for Standardization, Geneva, CH."},{"key":"e_1_3_2_1_13_1","volume-title":"International Journal of Parallel Programming 46 (12","author":"Jaeger David","year":"2016","unstructured":"David Jaeger, Hendrik Graupner, Chris Pelchen, Feng Cheng, and Christoph Meinel. 2016. Fast Automated Processing and Evaluation of Identity Leaks. International Journal of Parallel Programming 46 (12 2016)."},{"volume-title":"Technology and Practice of Passwords, Stig\u00a0F","author":"Jaeger David","key":"e_1_3_2_1_14_1","unstructured":"David Jaeger, Hendrik Graupner, Andrey Sapegin, Feng Cheng, and Christoph Meinel. 2015. Gathering and Analyzing Identity Leaks for Security Awareness. In Technology and Practice of Passwords, Stig\u00a0F. Mj\u00f8lsnes (Ed.). Springer International Publishing, Cham, 102\u2013115."},{"key":"e_1_3_2_1_15_1","unstructured":"Joseph Johnson. 2021. Cyber crime: number of breaches and records exposed 2005-2020. Retrieved 2021\/06\/18 08:31:42from https:\/\/www.statista.com\/statistics\/273550\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2389518"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS.2015.7359420"},{"key":"e_1_3_2_1_18_1","unstructured":"localos. 2019. PoCyMa. Retrieved 2021\/06\/18 08:31:42from https:\/\/github.com\/localos\/PoCyMa"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203217.3203269"},{"volume-title":"Applied Security Visualization(1 ed.)","author":"Marty Raffael","key":"e_1_3_2_1_20_1","unstructured":"Raffael Marty. 2008. Applied Security Visualization(1 ed.). Addison-Wesley Professional."},{"key":"e_1_3_2_1_21_1","volume-title":"Act: The Deming or Shewhart Cycle","author":"Milgram L.","year":"1999","unstructured":"L. Milgram, A. Spector, and M. Treger. 1999. Plan, Do, Check, Act: The Deming or Shewhart Cycle. Gulf Professional Publishing, Boston."},{"key":"e_1_3_2_1_23_1","volume-title":"NERD: Neural Network for Edict of Risky Data Streams. CoRR abs\/2007.07753(2020).","author":"Passarelli Sandro","year":"2020","unstructured":"Sandro Passarelli, Cem G\u00fcndogan, Lars Stiemert, Matthias Schopp, and Peter Hillmann. 2020. NERD: Neural Network for Edict of Risky Data Streams. CoRR abs\/2007.07753(2020)."},{"key":"e_1_3_2_1_24_1","unstructured":"Pastebin. 2021. Pastebin.com - # 1 paste tool since 2002!Retrieved 2021\/06\/18 08:31:42from https:\/\/pastebin.com"},{"key":"e_1_3_2_1_25_1","unstructured":"Daniela P\u00f6hn and Wolfgang Hommel. 2020. IMC: A Classification of Identity Management Approaches. In Computer Security Ioana Boureanu Constantin\u00a0C\u0103t\u0103lin Dr\u0103gan Mark Manulis Thanassis Giannetsos Christoforos Dadoyan Panagiotis Gouvas Roger\u00a0A. Hallman Shujun Li Victor Chang Frank Pallas J\u00f6rg Pohle and Angela Sasse(Eds.). Springer International Publishing Cham 3\u201320."},{"key":"e_1_3_2_1_26_1","unstructured":"Sajay Rai Frank Bresz Tim Renshaw Jeffrey Rozek and Torpey White. 2007. Identity and Access Management. Audit Guide."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/VL.1996.545307"},{"key":"e_1_3_2_1_28_1","unstructured":"Rob van\u00a0der Meulen. 2017. Build Adaptive Security Architecture Into Your Organization. Retrieved 2021\/06\/18 08:31:42from https:\/\/www.gartner.com\/smarterwithgartner\/build-adaptive-security-architecture-into-your-organization\/"},{"key":"e_1_3_2_1_29_1","volume-title":"ICIMP 2013, The Eighth International Conference on Internet Monitoring and Protection, William Dougherty and Petre Dini (Eds.). IARIA, Roma, Italia, 14\u201319","author":"von Eye Felix","year":"2013","unstructured":"Felix von Eye, David Schmitz, and Wolfgang Hommel. 2013. SLOPPI \u2013 a Framework for Secure Logging with Privacy Protection and Integrity. In ICIMP 2013, The Eighth International Conference on Internet Monitoring and Protection, William Dougherty and Petre Dini (Eds.). IARIA, Roma, Italia, 14\u201319."},{"key":"e_1_3_2_1_30_1","volume-title":"Information Visualization: Perception for Design","author":"Ware Colin","year":"2004","unstructured":"Colin Ware. 2004. Information Visualization: Perception for Design: Second Edition. Morgan Kaufmann Publishers Inc."}],"event":{"name":"ARES 2021: The 16th International Conference on Availability, Reliability and Security","acronym":"ARES 2021","location":"Vienna Austria"},"container-title":["Proceedings of the 16th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470055","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465481.3470055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:24Z","timestamp":1750191444000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":27,"alternative-id":["10.1145\/3465481.3470055","10.1145\/3465481"],"URL":"https:\/\/doi.org\/10.1145\/3465481.3470055","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2021-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}