Exploring twisted paths: Analyzing authorization processes in organizations

Problems in organizational authorization result in productivity impacts and in security risks, for example, from over-entitlements and non-compliance. Many of the problems originate from organizational dynamics in combination with problematic authorization procedures for permission changes. To mitig...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Bartsch, S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 223
container_issue
container_start_page 216
container_title
container_volume
creator Bartsch, S.
description Problems in organizational authorization result in productivity impacts and in security risks, for example, from over-entitlements and non-compliance. Many of the problems originate from organizational dynamics in combination with problematic authorization procedures for permission changes. To mitigate these problems and to improve the processes or craft supporting tools, a solid understanding of the processes and interactions between stakeholders is required. However, little prior empirical research covers authorization procedures. This paper presents an exploratory study of the procedures in organizational contexts. To enable a systematic analysis, an authorization process model is introduced that focuses on the interrelation of stakeholders and activities. The study discusses process characteristics, including the degree of centralization and the formality of interactions. Beyond this study, the model should serve as a basis for further research and support process designers to identify potentials of improvements.
doi_str_mv 10.1109/ICNSS.2011.6060003
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6060003</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6060003</ieee_id><sourcerecordid>6060003</sourcerecordid><originalsourceid>FETCH-LOGICAL-c139t-e6e8d7e32dde694258bcdb866b7a6a9e43b5db0214e59c6e9bd2150b6969753f3</originalsourceid><addsrcrecordid>eNotj0FOwzAURI0QElByAdj4AgnfcWzH7KqolIoKFoV1Zce_rVFIotgI2tMTRFaj0TyNZgi5ZZAxBvp-Vb1sNlkOjGUSJADwM3LNCqEUFBL0OUm0KicvSnZJkhA-Rgyk1AXoK_K8-OmbbvDtnsZvHyI62pt4CA903prmePoLzFc8jMjJRN-1tB-6GkPAQH1Lu2Fv2ikJN-RiZ5qAyaQz8v64eKue0vXrclXN12nNuI4pSiydQp47h-OKXJS2draU0iojjcaCW-Es5KxAoWuJ2rqcCbBSS60E3_EZufvv9Yi47Qf_aYbjdvrPfwHwOlBH</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Exploring twisted paths: Analyzing authorization processes in organizations</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bartsch, S.</creator><creatorcontrib>Bartsch, S.</creatorcontrib><description>Problems in organizational authorization result in productivity impacts and in security risks, for example, from over-entitlements and non-compliance. Many of the problems originate from organizational dynamics in combination with problematic authorization procedures for permission changes. To mitigate these problems and to improve the processes or craft supporting tools, a solid understanding of the processes and interactions between stakeholders is required. However, little prior empirical research covers authorization procedures. This paper presents an exploratory study of the procedures in organizational contexts. To enable a systematic analysis, an authorization process model is introduced that focuses on the interrelation of stakeholders and activities. The study discusses process characteristics, including the degree of centralization and the formality of interactions. Beyond this study, the model should serve as a basis for further research and support process designers to identify potentials of improvements.</description><identifier>ISBN: 9781457704581</identifier><identifier>ISBN: 1457704587</identifier><identifier>EISBN: 1457704609</identifier><identifier>EISBN: 9781457704604</identifier><identifier>EISBN: 1457704595</identifier><identifier>EISBN: 9781457704598</identifier><identifier>DOI: 10.1109/ICNSS.2011.6060003</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Authorization ; Context ; Organizations ; Process management ; Productivity ; Security management ; Software</subject><ispartof>2011 5th International Conference on Network and System Security, 2011, p.216-223</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c139t-e6e8d7e32dde694258bcdb866b7a6a9e43b5db0214e59c6e9bd2150b6969753f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6060003$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6060003$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bartsch, S.</creatorcontrib><title>Exploring twisted paths: Analyzing authorization processes in organizations</title><title>2011 5th International Conference on Network and System Security</title><addtitle>ICNSS</addtitle><description>Problems in organizational authorization result in productivity impacts and in security risks, for example, from over-entitlements and non-compliance. Many of the problems originate from organizational dynamics in combination with problematic authorization procedures for permission changes. To mitigate these problems and to improve the processes or craft supporting tools, a solid understanding of the processes and interactions between stakeholders is required. However, little prior empirical research covers authorization procedures. This paper presents an exploratory study of the procedures in organizational contexts. To enable a systematic analysis, an authorization process model is introduced that focuses on the interrelation of stakeholders and activities. The study discusses process characteristics, including the degree of centralization and the formality of interactions. Beyond this study, the model should serve as a basis for further research and support process designers to identify potentials of improvements.</description><subject>Access control</subject><subject>Authorization</subject><subject>Context</subject><subject>Organizations</subject><subject>Process management</subject><subject>Productivity</subject><subject>Security management</subject><subject>Software</subject><isbn>9781457704581</isbn><isbn>1457704587</isbn><isbn>1457704609</isbn><isbn>9781457704604</isbn><isbn>1457704595</isbn><isbn>9781457704598</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj0FOwzAURI0QElByAdj4AgnfcWzH7KqolIoKFoV1Zce_rVFIotgI2tMTRFaj0TyNZgi5ZZAxBvp-Vb1sNlkOjGUSJADwM3LNCqEUFBL0OUm0KicvSnZJkhA-Rgyk1AXoK_K8-OmbbvDtnsZvHyI62pt4CA903prmePoLzFc8jMjJRN-1tB-6GkPAQH1Lu2Fv2ikJN-RiZ5qAyaQz8v64eKue0vXrclXN12nNuI4pSiydQp47h-OKXJS2draU0iojjcaCW-Es5KxAoWuJ2rqcCbBSS60E3_EZufvv9Yi47Qf_aYbjdvrPfwHwOlBH</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Bartsch, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>Exploring twisted paths: Analyzing authorization processes in organizations</title><author>Bartsch, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c139t-e6e8d7e32dde694258bcdb866b7a6a9e43b5db0214e59c6e9bd2150b6969753f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Access control</topic><topic>Authorization</topic><topic>Context</topic><topic>Organizations</topic><topic>Process management</topic><topic>Productivity</topic><topic>Security management</topic><topic>Software</topic><toplevel>online_resources</toplevel><creatorcontrib>Bartsch, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bartsch, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Exploring twisted paths: Analyzing authorization processes in organizations</atitle><btitle>2011 5th International Conference on Network and System Security</btitle><stitle>ICNSS</stitle><date>2011-09</date><risdate>2011</risdate><spage>216</spage><epage>223</epage><pages>216-223</pages><isbn>9781457704581</isbn><isbn>1457704587</isbn><eisbn>1457704609</eisbn><eisbn>9781457704604</eisbn><eisbn>1457704595</eisbn><eisbn>9781457704598</eisbn><abstract>Problems in organizational authorization result in productivity impacts and in security risks, for example, from over-entitlements and non-compliance. Many of the problems originate from organizational dynamics in combination with problematic authorization procedures for permission changes. To mitigate these problems and to improve the processes or craft supporting tools, a solid understanding of the processes and interactions between stakeholders is required. However, little prior empirical research covers authorization procedures. This paper presents an exploratory study of the procedures in organizational contexts. To enable a systematic analysis, an authorization process model is introduced that focuses on the interrelation of stakeholders and activities. The study discusses process characteristics, including the degree of centralization and the formality of interactions. Beyond this study, the model should serve as a basis for further research and support process designers to identify potentials of improvements.</abstract><pub>IEEE</pub><doi>10.1109/ICNSS.2011.6060003</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781457704581
ispartof 2011 5th International Conference on Network and System Security, 2011, p.216-223
issn
language eng
recordid cdi_ieee_primary_6060003
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Authorization
Context
Organizations
Process management
Productivity
Security management
Software
title Exploring twisted paths: Analyzing authorization processes in organizations
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T12%3A25%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Exploring%20twisted%20paths:%20Analyzing%20authorization%20processes%20in%20organizations&rft.btitle=2011%205th%20International%20Conference%20on%20Network%20and%20System%20Security&rft.au=Bartsch,%20S.&rft.date=2011-09&rft.spage=216&rft.epage=223&rft.pages=216-223&rft.isbn=9781457704581&rft.isbn_list=1457704587&rft_id=info:doi/10.1109/ICNSS.2011.6060003&rft_dat=%3Cieee_6IE%3E6060003%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1457704609&rft.eisbn_list=9781457704604&rft.eisbn_list=1457704595&rft.eisbn_list=9781457704598&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6060003&rfr_iscdi=true