Exploring twisted paths: Analyzing authorization processes in organizations
Problems in organizational authorization result in productivity impacts and in security risks, for example, from over-entitlements and non-compliance. Many of the problems originate from organizational dynamics in combination with problematic authorization procedures for permission changes. To mitig...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 223 |
---|---|
container_issue | |
container_start_page | 216 |
container_title | |
container_volume | |
creator | Bartsch, S. |
description | Problems in organizational authorization result in productivity impacts and in security risks, for example, from over-entitlements and non-compliance. Many of the problems originate from organizational dynamics in combination with problematic authorization procedures for permission changes. To mitigate these problems and to improve the processes or craft supporting tools, a solid understanding of the processes and interactions between stakeholders is required. However, little prior empirical research covers authorization procedures. This paper presents an exploratory study of the procedures in organizational contexts. To enable a systematic analysis, an authorization process model is introduced that focuses on the interrelation of stakeholders and activities. The study discusses process characteristics, including the degree of centralization and the formality of interactions. Beyond this study, the model should serve as a basis for further research and support process designers to identify potentials of improvements. |
doi_str_mv | 10.1109/ICNSS.2011.6060003 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6060003</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6060003</ieee_id><sourcerecordid>6060003</sourcerecordid><originalsourceid>FETCH-LOGICAL-c139t-e6e8d7e32dde694258bcdb866b7a6a9e43b5db0214e59c6e9bd2150b6969753f3</originalsourceid><addsrcrecordid>eNotj0FOwzAURI0QElByAdj4AgnfcWzH7KqolIoKFoV1Zce_rVFIotgI2tMTRFaj0TyNZgi5ZZAxBvp-Vb1sNlkOjGUSJADwM3LNCqEUFBL0OUm0KicvSnZJkhA-Rgyk1AXoK_K8-OmbbvDtnsZvHyI62pt4CA903prmePoLzFc8jMjJRN-1tB-6GkPAQH1Lu2Fv2ikJN-RiZ5qAyaQz8v64eKue0vXrclXN12nNuI4pSiydQp47h-OKXJS2draU0iojjcaCW-Es5KxAoWuJ2rqcCbBSS60E3_EZufvv9Yi47Qf_aYbjdvrPfwHwOlBH</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Exploring twisted paths: Analyzing authorization processes in organizations</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bartsch, S.</creator><creatorcontrib>Bartsch, S.</creatorcontrib><description>Problems in organizational authorization result in productivity impacts and in security risks, for example, from over-entitlements and non-compliance. Many of the problems originate from organizational dynamics in combination with problematic authorization procedures for permission changes. To mitigate these problems and to improve the processes or craft supporting tools, a solid understanding of the processes and interactions between stakeholders is required. However, little prior empirical research covers authorization procedures. This paper presents an exploratory study of the procedures in organizational contexts. To enable a systematic analysis, an authorization process model is introduced that focuses on the interrelation of stakeholders and activities. The study discusses process characteristics, including the degree of centralization and the formality of interactions. Beyond this study, the model should serve as a basis for further research and support process designers to identify potentials of improvements.</description><identifier>ISBN: 9781457704581</identifier><identifier>ISBN: 1457704587</identifier><identifier>EISBN: 1457704609</identifier><identifier>EISBN: 9781457704604</identifier><identifier>EISBN: 1457704595</identifier><identifier>EISBN: 9781457704598</identifier><identifier>DOI: 10.1109/ICNSS.2011.6060003</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Authorization ; Context ; Organizations ; Process management ; Productivity ; Security management ; Software</subject><ispartof>2011 5th International Conference on Network and System Security, 2011, p.216-223</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c139t-e6e8d7e32dde694258bcdb866b7a6a9e43b5db0214e59c6e9bd2150b6969753f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6060003$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6060003$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bartsch, S.</creatorcontrib><title>Exploring twisted paths: Analyzing authorization processes in organizations</title><title>2011 5th International Conference on Network and System Security</title><addtitle>ICNSS</addtitle><description>Problems in organizational authorization result in productivity impacts and in security risks, for example, from over-entitlements and non-compliance. Many of the problems originate from organizational dynamics in combination with problematic authorization procedures for permission changes. To mitigate these problems and to improve the processes or craft supporting tools, a solid understanding of the processes and interactions between stakeholders is required. However, little prior empirical research covers authorization procedures. This paper presents an exploratory study of the procedures in organizational contexts. To enable a systematic analysis, an authorization process model is introduced that focuses on the interrelation of stakeholders and activities. The study discusses process characteristics, including the degree of centralization and the formality of interactions. Beyond this study, the model should serve as a basis for further research and support process designers to identify potentials of improvements.</description><subject>Access control</subject><subject>Authorization</subject><subject>Context</subject><subject>Organizations</subject><subject>Process management</subject><subject>Productivity</subject><subject>Security management</subject><subject>Software</subject><isbn>9781457704581</isbn><isbn>1457704587</isbn><isbn>1457704609</isbn><isbn>9781457704604</isbn><isbn>1457704595</isbn><isbn>9781457704598</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj0FOwzAURI0QElByAdj4AgnfcWzH7KqolIoKFoV1Zce_rVFIotgI2tMTRFaj0TyNZgi5ZZAxBvp-Vb1sNlkOjGUSJADwM3LNCqEUFBL0OUm0KicvSnZJkhA-Rgyk1AXoK_K8-OmbbvDtnsZvHyI62pt4CA903prmePoLzFc8jMjJRN-1tB-6GkPAQH1Lu2Fv2ikJN-RiZ5qAyaQz8v64eKue0vXrclXN12nNuI4pSiydQp47h-OKXJS2draU0iojjcaCW-Es5KxAoWuJ2rqcCbBSS60E3_EZufvv9Yi47Qf_aYbjdvrPfwHwOlBH</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Bartsch, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>Exploring twisted paths: Analyzing authorization processes in organizations</title><author>Bartsch, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c139t-e6e8d7e32dde694258bcdb866b7a6a9e43b5db0214e59c6e9bd2150b6969753f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Access control</topic><topic>Authorization</topic><topic>Context</topic><topic>Organizations</topic><topic>Process management</topic><topic>Productivity</topic><topic>Security management</topic><topic>Software</topic><toplevel>online_resources</toplevel><creatorcontrib>Bartsch, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bartsch, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Exploring twisted paths: Analyzing authorization processes in organizations</atitle><btitle>2011 5th International Conference on Network and System Security</btitle><stitle>ICNSS</stitle><date>2011-09</date><risdate>2011</risdate><spage>216</spage><epage>223</epage><pages>216-223</pages><isbn>9781457704581</isbn><isbn>1457704587</isbn><eisbn>1457704609</eisbn><eisbn>9781457704604</eisbn><eisbn>1457704595</eisbn><eisbn>9781457704598</eisbn><abstract>Problems in organizational authorization result in productivity impacts and in security risks, for example, from over-entitlements and non-compliance. Many of the problems originate from organizational dynamics in combination with problematic authorization procedures for permission changes. To mitigate these problems and to improve the processes or craft supporting tools, a solid understanding of the processes and interactions between stakeholders is required. However, little prior empirical research covers authorization procedures. This paper presents an exploratory study of the procedures in organizational contexts. To enable a systematic analysis, an authorization process model is introduced that focuses on the interrelation of stakeholders and activities. The study discusses process characteristics, including the degree of centralization and the formality of interactions. Beyond this study, the model should serve as a basis for further research and support process designers to identify potentials of improvements.</abstract><pub>IEEE</pub><doi>10.1109/ICNSS.2011.6060003</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781457704581 |
ispartof | 2011 5th International Conference on Network and System Security, 2011, p.216-223 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6060003 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Authorization Context Organizations Process management Productivity Security management Software |
title | Exploring twisted paths: Analyzing authorization processes in organizations |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T12%3A25%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Exploring%20twisted%20paths:%20Analyzing%20authorization%20processes%20in%20organizations&rft.btitle=2011%205th%20International%20Conference%20on%20Network%20and%20System%20Security&rft.au=Bartsch,%20S.&rft.date=2011-09&rft.spage=216&rft.epage=223&rft.pages=216-223&rft.isbn=9781457704581&rft.isbn_list=1457704587&rft_id=info:doi/10.1109/ICNSS.2011.6060003&rft_dat=%3Cieee_6IE%3E6060003%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1457704609&rft.eisbn_list=9781457704604&rft.eisbn_list=1457704595&rft.eisbn_list=9781457704598&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6060003&rfr_iscdi=true |