documents. Finally, the comparably high
χ
2
values
per use case indicate a clear difference when applying
our proposed work.
In the future we want to further apply our architec-
tural approach to more IAM use cases in order to col-
lect even further data. By using our extended archi-
tecture, enterprises can achieve the integration of such
additional information. As we provide a more generic
approach for this, it has to be specifically tailored to
the individual enterprise. This is a step not covered
within our work and needs to be done within an IAM
project in cooperation with the respective business.
One aspect of this is also the appliance and extent of
privacy measures or IAM processes in general.
ACKNOWLEDGEMENTS
This research was supported by the Federal Ministry
of Education and Research, Germany, as part of the
BMBF DINGfest project (https://dingfest.ur.de).
REFERENCES
Anderson, G. F., Selby, D. A., and Ramsey, M. (2007).
Insider attack and real-time data mining of user be-
havior. IBM Journal of Research and Development,
51(3.4):465–475.
Basel Comittee on Banking Supervisions (2010). Basel III:
Int. framework for liquidity risk measurement, stan-
dards and monitoring.
Batini, C. and Scannapieco, M. (2016). Data and informa-
tion quality: Dimensions, principles and techniques.
Springer.
Colantonio, A., Di Pietro, R., Ocello, A., and Verde, N.
(2012). Visual role mining: A picture is worth a thou-
sand roles. IEEE Transactions on Knowledge and
Data Engineering, 24(6):1120–1133.
Dunphy, P. and Petitcolas, F. A. P. (2018). A first look
at identity management schemes on the blockchain.
IEEE Security Privacy, 16(4):20–29.
Elliott, A. and Knight, S. (2010). Role explosion: Acknowl-
edging the problem. In Proceedings of the 8th Interna-
tional Conference on Software Engineering Research
and Practice, pages 349–355.
Fuchs, L. and Pernul, G. (2008). Hydro–hybrid develop-
ment of roles. In Proceedings of the 2008 Interna-
tional Conference on Information Systems Security,
pages 287–302. Springer.
Hu, V., Ferraiolo, D. F., Kuhn, D. R., Kacker, R. N., and Lei,
Y. (2015). Implementing and managing policy rules in
attribute based access control. In Proceedings of the
2015 IEEE International Conference on Information
Reuse and Integration, pages 518–525. IEEE.
Hu, V. C., Ferraiolo, D. F., Kuhn, D. R., Schnitzer, A., San-
dlin, K., Miller, R., and Scarfone, K. (2014). Guide to
attribute based access control (ABAC) definition and
considerations. NIST Special Publication.
Hummer, M., Kunz, M., Netter, M., Fuchs, L., and Pernul,
G. (2015). Advanced identity and access policy man-
agement using contextual data. In Proceedings of the
IEEE International Conference on Availability, Relia-
bility and Security, pages 40–49. IEEE Computer So-
ciety.
Hummer, M., Kunz, M., Netter, M., Fuchs, L., and Pernul,
G. (2016). Adaptive identity and access management
- contextual data based policies. EURASIP Journal on
Information Security, 2016(1):1–19.
Kaiser, M., Klier, M., and Heinrich, B. (2007). How to
measure data quality?–A metric-based approach. In
Proceedings of the 28th International Conference on
Information Systems. AISeL.
Kunz, M., Fuchs, L., Hummer, M., and Pernul, G. (2015).
Introducing dynamic identity and access management
in organizations. In Proceedings of the 11th Inter-
national Conference on Information Systems Security,
pages 139–158.
Kunz, M., Puchta, A., Groll, S., Fuchs, L., and Pernul, G.
(2019). Attribute quality management for dynamic
identity and access management. Journal of Informa-
tion Security and Applications, 44:64–79.
Menges, F. and Pernul, G. (2018). A comparative analysis
of incident reporting formats. Computers & Security,
73:87 – 101.
Nuss, M., Puchta, A., and Kunz, M. (2018). Towards
blockchain-based identity and access management for
internet of things in enterprises. In Proceedings of
the International Conference on Trust and Privacy in
Digital Business, pages 167–181. Springer.
Osmanoglu, E. (2013). Identity and Access Manage-
ment: Business Performance Through Connected In-
telligence. Newnes.
Puchta, A., B
¨
ohm, F., and Pernul, G. (2019). Contributing
to current challenges in identity and access manage-
ment with visual analytics. In Foley, S. N., editor,
Data and Applications Security and Privacy XXXIII -
33rd Annual IFIP WG 11.3 Conference, DBSec 2019,
Charleston, SC, USA, July 15-17, 2019, Proceedings,
volume 11559 of Lecture Notes in Computer Science,
pages 221–239. Springer.
Reinwarth, M. (2019). Access reviews done right.
Technical report, Kuppingercole Analysts,
https://www.kuppingercole.com/report/lb80195.
Samarati, P. and de Vimercati, S. C. (2000). Access con-
trol: Policies, models, and mechanisms. In Interna-
tional School on Foundations of Security Analysis and
Design, pages 137–196. Springer.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. Com-
puter, 29(2):38–47.
SOX (2002). Sarbanes-Oxley Act of 2002, pl 107-204, 116
stat 745.
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
618