Suche

Wo soll gesucht werden?
Erweiterte Literatursuche

Ariadne Pfad:

Inhalt

Literaturnachweis - Detailanzeige

 
Autor/inAntony, Laljith
TitelInformation Leaks and Limitations of Role-Based Access Control Mechanisms: A Qualitative Exploratory Single Case Study
Quelle(2016), (148 Seiten)
PDF als Volltext Verfügbarkeit 
Ph.D. Dissertation, Northcentral University
Spracheenglisch
Dokumenttypgedruckt; online; Monographie
ISBN978-1-3694-4746-0
SchlagwörterHochschulschrift; Dissertation; Computer Software; Qualitative Research; Case Studies; Information Security; Information Scientists; Semi Structured Interviews; Telephone Surveys; Computer Oriented Programs; Computer Security; Privacy
AbstractFailing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based access control (RBAC) is the most predominant access control mechanism available today. Information security professionals implement access control policies in software applications to prevent information from being leaked to unauthorized users. This qualitative case study explored the perspectives of information security professionals about the limitations of RBAC and the ways these limitations could be addressed by using variants of RBAC. A purposive sample that included 13 information professionals was used for this study. The data were collected through in-depth, semi-structured telephone interviews with these participants. The data were analyzed with techniques that included compiling, disassembling, reassembling, interpreting, and concluding. The participants revealed that the American National Standards Institute (ANSI) RBAC model has several deficiencies. Some of the major deficiencies identified included RBAC's inability to address possible human errors in access control policies and coping with changes to application architecture methodologies. The results suggested that role engineering approaches available today are unable to prevent over-entitlement of users and RBAC has difficulties associated with monitoring and analysis of role-based access control policies. These deficiencies of RBAC have the implications of causing security vulnerabilities in software applications. These security vulnerabilities lead to confidential and proprietary information being leaked to unauthorized users. However, the variants that implement context-aware extensions to RBAC that use authorization factors other than users' roles could offer additional protection against information leaks. Moreover, enhancing the RBAC model by adding the ability to temporally delegate permissions to users could potentially limit information leaks. Several recommendations are given to information security professionals on how to address some of these deficiencies of RBAC model. The findings of this study are expected to strengthen companies' information security. Because the usage of these variants is not part of the current ANSI RBAC standard, recommendation for future research include evaluating the effectiveness of the usage of such variants on access control policies and developing a formal survey to address satisfaction levels with RBAC. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://www.proquest.com/en-US/products/dissertations/individuals.shtml.] (As Provided).
AnmerkungenProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site: http://www.proquest.com/en-US/products/dissertations/individuals.shtml
Erfasst vonERIC (Education Resources Information Center), Washington, DC
Update2020/1/01
Literaturbeschaffung und Bestandsnachweise in Bibliotheken prüfen
 

Standortunabhängige Dienste
Die Wikipedia-ISBN-Suche verweist direkt auf eine Bezugsquelle Ihrer Wahl.
Tipps zum Auffinden elektronischer Volltexte im Video-Tutorial

Trefferlisten Einstellungen

Permalink als QR-Code

Permalink als QR-Code

Inhalt auf sozialen Plattformen teilen (nur vorhanden, wenn Javascript eingeschaltet ist)

Teile diese Seite: