{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T05:11:20Z","timestamp":1654146680631},"reference-count":39,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7,1]]},"abstract":"<p>Identity management projects are often a great challenge for organizations. This is not due to the technical complexity of these projects, but due to the fact that managing access to resources and services involves a deep understanding of organizational responsibilities, workflows, and processes. The presented approach aims at enabling domain experts to deal with that complexity without the support of external expertise. To accomplish this, the approach involves the organizational dimension of role engineering. The integration of the organizational layer is achieved by seamlessly integrating model data from process optimization projects. Conceptual models carry knowledge about the structure of an organization and its processes. The role engineering process is driven by the information in these models. The presented approach is not limited to the technical level and thus allows a high degree of automation. This research deals with \u2013 in addition to a practical illustration \u2013 a theoretical answer to the question whether it is even possible to integrate semi-formal models in an automated transformation process of transformation and requirements for such a process. The aim of this paper is to give a first positive answer to this question and to provide a way to automatically generate a useful setting for configuring identity management systems based on semi-formal models.<\/p>","DOI":"10.4018\/irmj.2012070105","type":"journal-article","created":{"date-parts":[[2012,12,6]],"date-time":"2012-12-06T16:19:12Z","timestamp":1354810752000},"page":"98-116","source":"Crossref","is-referenced-by-count":3,"title":["Usage and Impact of Model-Based User Authorization"],"prefix":"10.4018","volume":"25","author":[{"given":"Martin","family":"Juhrisch","sequence":"first","affiliation":[{"name":"Dresden University of Technology, Germany"}]},{"given":"Gunnar","family":"Dietz","sequence":"additional","affiliation":[{"name":"Dresden University of Technology, Germany"}]}],"member":"2432","reference":[{"key":"irmj.2012070105-0","unstructured":"Algermissen, L. (2007). Prozessorientierte Verwaltungsmodernisierung: Gestaltung der Prozesslandschaft in \u00f6ffentlichen Verwaltungen mit der PICTURE-Method. Westf\u00e4lische Wilhelms-Universit\u00e4t M\u00fcnster, M\u00fcnster, Germany."},{"key":"irmj.2012070105-1","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/978-3-322-81127-1_16","article-title":"Epistemologische Positionierung in der w Wirtschaftsinformatik am Beispiel einer konsensorientierten Informationsmodellierung","author":"J.Becker","year":"2004","journal-title":"Wissenschaftstheorie in \u00d6konomie und Wirtschaftsinformatik - Theoriebildung und -bewertung, Ontologien, Wissensmanagement"},{"key":"irmj.2012070105-2","doi-asserted-by":"crossref","unstructured":"Becker, J., Pfeiffer, D., & R\u00e4ckers, M. (2007). Domain specific process modelling in public administrations: The picture-approach. In M. A. Wimmer, J. Scholl, & \u00c5. Gr\u00f6nlund (Eds.), Proceedings of the 6th International Conference on Electronic Government (LNCS 4656, pp. 68-79).","DOI":"10.1007\/978-3-540-74444-3_7"},{"key":"irmj.2012070105-3","unstructured":"Bergener, P., Pfeiffer, D., & R\u00e4ckers, M. (2009). How to inform the point of single contact? \u2013 A business process based approach. In Proceedings of the 9th Internationale Tagung Wirtschaftsinformatik: Business Services: Konzepte, Technologien, Anwendungen, Vienna, Austria (pp. 635-644)."},{"key":"irmj.2012070105-4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.9"},{"key":"irmj.2012070105-5","author":"A.Buecker","year":"2008","journal-title":"Deployment guide series: IBM Tivoli Identity Manager 5.0 (Tech. Rep.)"},{"key":"irmj.2012070105-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2008.07.002"},{"key":"irmj.2012070105-7","unstructured":"Dietz, G., & G\u00f6cks, M. (2008). Serviceorientierung durch hochschul\u00fcbergreifendes Identit\u00e4tsmanagement. In Informatik\u2014 Beherrschbare Systeme \u2014 dank Informatik Informatik, Beitr\u00e4ge der 36. Jahrestagung der Gesellschaft f\u00fcr Informatik e.V. (GI) (Vol. 134, pp. 575-580)."},{"key":"irmj.2012070105-8","unstructured":"Dietz, G., & Juhrisch, M. (2008). Managing university identity management systems: A design science approach. In Informatik\u2014 Beherrschbare Systeme \u2014 dank Informatik Informatik, Beitr\u00e4ge der 36. Jahrestagung der Gesellschaft f\u00fcr Informatik e.V. (GI) (Vol. 133, pp. 123-128)."},{"key":"irmj.2012070105-9","unstructured":"Dietz, G., & Juhrisch, M. (2010). Model-based management \u2013 Design and experimental evaluation. In Proceedings of the Pacific Asia Conference on Information Systems, Taipei, Taiwan (p. 44)."},{"key":"irmj.2012070105-10","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.30"},{"key":"irmj.2012070105-11","unstructured":"Dietz, G., Juhrisch, M., & Gro\u00dfmann, K. (2011). Inherence of ratios for service identification and evaluation. In Proceedings of the Americas Conference on Information Systems, Detroit, MI (p. 204)."},{"key":"irmj.2012070105-12","doi-asserted-by":"crossref","unstructured":"Dietz, G., Juhrisch, M., & Leyking, K. (2010). Convolution as the key for service-identification in complex process models. In Proceedings of the 19th International Conference on Information Systems Development, Prague, Czech Republic (pp. 181-193).Fernandez, E. B., Pernul, G., & Larrando-Petrie, M. M. (2008, September 4-5). Patterns and pattern diagrams for access control. In S. Furnell (Ed.), Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business, Turin, Italy (LNCS 5185, pp. 38-47).","DOI":"10.1007\/978-1-4419-9790-6_15"},{"key":"irmj.2012070105-13","unstructured":"Ferraiolo, D. F., & Kuhn, D. R. (1992). Role based access control. In Proceedings of the 15th National Computer Security Conference (pp. 554-563)."},{"key":"irmj.2012070105-14","volume":"Vol. 1","author":"O. K.Ferstl","year":"2001","journal-title":"Grundlagen der Wirtschaftsinformatik"},{"key":"irmj.2012070105-15","doi-asserted-by":"crossref","unstructured":"Fuchs, L., Pernul, G., & Sandhu, R. (2011). Roles in information security - A survey and classification of the research area. Computers & Security.","DOI":"10.1016\/j.cose.2011.08.002"},{"key":"irmj.2012070105-16","doi-asserted-by":"crossref","unstructured":"Fuchs, L., & Preis, A. (2008, September 4-5). Busirole: A model for integrating business roles into identity management. In S. Furnell (Ed.), Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business, Turin, Italy (LNCS 5185, pp. 128-138).","DOI":"10.1007\/978-3-540-85735-8_13"},{"key":"irmj.2012070105-17","author":"A.Gehlert","year":"2007","journal-title":"Migration fachkonzeptueller Modelle"},{"key":"irmj.2012070105-18","unstructured":"Gehlert, A., Schermann, M., Pohl, K., & Krcmar, H. (2009). Towards a research method for theory-driven design research. In Business Services: Konzepte, Technologien, Anwendungen, 9. Internationale Tagung Wirtschaftsinformatik, 1, 441-450."},{"key":"irmj.2012070105-19","unstructured":"Hammel, C., Schlitt, M., & Wolf, S. (1998). Wiederverwendung in der Unternehmensmodellierung. Informationssystem-Architekturen, (2), 64-71."},{"key":"irmj.2012070105-20","author":"R. M.Hammer","year":"1993","journal-title":"Reengineering the corporation: A manifesto for business revolution"},{"key":"irmj.2012070105-21","author":"H.-J.Herrmann","year":"1991","journal-title":"Modellgest\u00fctzte Planung im Unternehmen: Entwicklung eines Rahmenkonzepts"},{"issue":"1","key":"irmj.2012070105-22","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","article-title":"Design science in information systems research.","volume":"28","author":"A. R.Hevner","year":"2004","journal-title":"Management Information Systems Quarterly"},{"key":"irmj.2012070105-23","unstructured":"Juhrisch, M. (2010). Richtlinien f\u00fcr die modellgetriebene Integration serviceorientierte Architekturen in Analysemodellen. Technische Universit\u00e4t Dresden, Dresden, Germany."},{"key":"irmj.2012070105-24","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEM.2010.032172"},{"key":"irmj.2012070105-25","unstructured":"Juhrisch, M., & Dietz, G. (2010b). Context-based modeling: Introducing a novel modeling approach. In Modellierung betrieblicher Informationssysteme, Dresden, Germany (pp. 111-130)."},{"key":"irmj.2012070105-26","unstructured":"Juhrisch, M., Dietz, G., & Esswein, W. (2009). Perspectives on semantic business process modeling \u2013 A generic approach. In Proceedings of the 13th Pacific Asia Conference on Information Systems, Hyderabad, India."},{"key":"irmj.2012070105-27","unstructured":"Juhrisch, M., Schlieter, H., & Dietz, G. (2011). Model-supported business alignment of IT \u2013 Conceptual foundations. In Proceedings of the 17th Americas Conference on Information Systems, Detroit, MI (p. 206)."},{"key":"irmj.2012070105-28","unstructured":"Karow, M., Gehlert, A., Becker, J., & Esswein, W. (2006). On the transition from computation independent to platform independent models. In Proceedings of the Americas Conference on Information Systems, Acapulco, Mexico (pp. 3913-3921)."},{"key":"irmj.2012070105-29","doi-asserted-by":"crossref","unstructured":"Kuhlmann, M., Shohat, D., & Schimpf, G. (2003). Role mining - revealing business roles for security administration using data mining technology. In Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (pp. 179-186). New York, NY: ACM.","DOI":"10.1145\/775412.775435"},{"key":"irmj.2012070105-30","doi-asserted-by":"crossref","unstructured":"Molloy, I., Li, N., Li, T., Mao, Z., Wang, Q., & Lobo, J. (2009). Evaluating role mining algorithms. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (pp. 95-104). New York, NY: ACM.","DOI":"10.1145\/1542207.1542224"},{"key":"irmj.2012070105-31","unstructured":"Novell. (2011). Identity manager roles based provisioning Module 4.0. user application: User guide. Retrieved from https:\/\/www.netiq.com\/documentation\/idm401\/pdfdoc\/install\/install.pdf"},{"key":"irmj.2012070105-32","unstructured":"Pfeiffer, D. (2007). Constructing comparable conceptual models with domain specific languages. In Proceedings of the 15th European Conference on Information Systems (pp. 876-888)."},{"key":"irmj.2012070105-33","unstructured":"Pfeiffer, D. (2008). Semantic business process analysis - Building block-based construction of automatically analyzable business process models. Westf\u00e4lische Wilhelms-Universit\u00e4t M\u00fcnster, M\u00fcnster, Germany."},{"key":"irmj.2012070105-34","unstructured":"Pfeiffer, D., & Gehlert, A. (2005). A framework for comparing conceptual models. In Proceedings of the Workshop on Enterprise Modelling and Information Systems Architectures (pp. 108-122)."},{"key":"irmj.2012070105-35","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-663-10233-5","author":"R.Sch\u00fctte","year":"1998","journal-title":"Grunds\u00e4tze ordnungsgem\u00e4\u00dfer Referenzmodellierung: Konstruktion konfigurations- und anpassungsorientierter Modelle (Number 233 in Neue betriebswirtschaftliche Forschung)"},{"key":"irmj.2012070105-36","unstructured":"Semture Gmb, H. (2009). Cubetto toolset. Retrieved from http:\/\/www.semture.de\/cubetto"},{"key":"irmj.2012070105-37","unstructured":"Weller, J. (2010). Modellgest\u00fctzte Prozessverbesserung (Unpublished doctoral dissertation). Technische Universit\u00e4t Dresden, Dresden, Germany."},{"key":"irmj.2012070105-38","author":"G.W\u00f6he","year":"1978","journal-title":"Einf\u00fchrung in die Allgemeine Betriebswirtschaftslehre"}],"container-title":["Information Resources Management Journal"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=68429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T04:39:27Z","timestamp":1654144767000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/irmj.2012070105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,7,1]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,7]]}},"URL":"https:\/\/doi.org\/10.4018\/irmj.2012070105","relation":{},"ISSN":["1040-1628","1533-7979"],"issn-type":[{"value":"1040-1628","type":"print"},{"value":"1533-7979","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,1]]}}}