REFERENCES
Assmann, D., Kalmar, R., and Punter, T. (2002).
Messen und Bewerten Von Webapplikationen Mit der
Goal/Question/Metric Methode: Handbuch. IESE-
Report / Fraunhofer Einrichtung Experimentelles
Software Engineering. Fraunhofer-IESE.
Basel Committee on Banking Supervision (2011). Basel
III - A global regulatory framework for more resilient
banks and banking systems.
Basili, V. R., Caldiera, G., and Rombach, H. D. (1994). Ex-
perience factory. Encyclopedia of software engineer-
ing, pages 470–476.
Bertino, E. and Takahashi, K. (2011). Identity Management:
Concepts, Technologies, and Systems. Artech House.
Bresz, F., Renshaw, T., Rozek, J., and White, T. (2007).
Identity and Access Management. Technical report,
Ernst and Young.
Council of the European Union (2016). EU General Data
Protection Regulation.
Cser, A. (2017). Use Commercial IAM Solutions To
Achieve More Than 100 Percent ROI Over Manual
Processes. Technical report, Forrester.
Dell (2011). Identity and Access Management. Technical
report, Dell Inc.
Fisher, P. (2016). Identity and Access Management in the
Digital Age. Technical report, CXP Group Company.
Fuchs, L. and Pernul, G. (2008). HyDRo–Hybrid Develop-
ment of Roles. Information Systems Security, pages
287–302.
Fuchs, L., Pernul, G., and Broser, C. (2009). Different Ap-
proaches to in-house Identity Management. In Proc of
the 4th International Conference on Availability, Re-
liability and Security (ARES 2009). IEEE Computer
Society, Fukuoka, Japan.
Gartner (2009). MarketScope for Enterprise Single Sign-
On. Technical report, Gartner.
Harvard, U. (2014). Identity and Access Management - Pro-
gram Plan.
Hermans, J. (2008). European Identity & Access Manage-
ment Survey. Technical report, KPMG.
H
¨
ollrigl, T., Schell, F., Suelmann, S., and Hartenstein, H.
(2008). Towards systematic engineering of Service-
Oriented access control in federated environments.
In Congress on Services Part II, 2008. SERVICES-2.
IEEE. IEEE.
Hovav, A. and Berger, R. (2009). Tutorial: Identity Man-
agement Systems and Secured Access Control. Com-
munications of the Association for Information Sys-
tems, 25(1):42.
Kazman, R., Barbacci, M., Klein, M., Carri
`
ere, S. J., and
Woods, S. G. (1999). Experience with performing
architecture tradeoff analysis. In Proceedings of the
21st international conference on Software engineer-
ing. ACM.
Kunz, M., Fuchs, L., Hummer, M., and Pernul, G. (2015).
Introducing dynamic identity and access management
in organizations. In International Conference on In-
formation Systems Security. Springer.
Meier, S., Fuchs, L., and Pernul, G. (2013). Managing the
Access Grid - A Process View to Minimize Insider
Misuse Risks. In 11th International Conference on
Wirtschaftsinformatik (WI2013). University Leipzig.
Peterson, G. (2006). Introduction to identity management
risk metrics. IEEE Security & Privacy, 4(4):88–91.
Royer, D. (2007). Enterprise identity management-what’s
in it for organisations?. In FIDIS.
Royer, D. (2013). Enterprise Identity Management: To-
wards an Investment Decision Support Approach.
Springer Science & Business Media.
Royer, D. and Meints, M. (2008). Planung und Bewertung
von Enterprise Identity Managementsystemen. Daten-
schutz und Datensicherheit-DuD, 32(3):189–193.
Schell, F., Dinger, J., and Hartenstein, H. (2009). Per-
formance evaluation of identity and access manage-
ment systems in federated environments. In Infoscale.
Springer.
Software Engineering of America (2015). Reduce IBM i
Help Desk Costs with Self Service Password Reset.
Technical report, Software Engineering of America.
Staite, C. and Bahsoon, R. (2012). Evaluating identity man-
agement architectures. In Proceedings of the 3rd in-
ternational ACM SIGSOFT symposium on Architect-
ing Critical Systems. ACM.
United States Congress (1996). Health Insurance Portability
and Accountability Act.
United States Congress (2002). Sarbanes-oxley act of 2002,
pl 107-204, 116 stat 745. Codified in Sections 11, 15,
18, 28, and 29 USC.
Windley, P. J. (2005). Digital Identity: Unmasking identity
management architecture (IMA). ” O’Reilly Media,
Inc.”.
Witty, R. J. (2003). Five Business Drivers of Identity and
Access Management. Technical report, Gartner.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
240