Abstract | ||
---|---|---|
Data privacy is a major issue for companies today. Risks can come from external attacks or from internal users disclosing sensitive data to the public. In the latter case, restricting user access to data mitigates the risk. Thanks to role-based access models, users see only the data that they need for their work. This paper presents a methodology for assessing how effective such restrictions are. It is based on classifying data, analyzing access paths, and understanding the impact of design principles. Its special contribution is its end-to-end view. It is applicable directly to complex IT landscapes being the norm today. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1007/978-3-642-28115-0_38 | Lecture Notes in Business Information Processing |
Keywords | Field | DocType |
Information Systems,Privacy,Testing | Design elements and principles,Data science,Information system,Computer science,Norm (social),Information privacy,Data access,Process management | Conference |
Volume | ISSN | Citations |
100 | 1865-1348 | 0 |
PageRank | References | Authors |
0.34 | 15 | 1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Klaus Haller | 1 | 47 | 5.22 |