000 03246nam a22004815i 4500
001 978-3-658-07365-7
003 DE-He213
005 20200421111652.0
007 cr nn 008mamaa
008 140919s2014 gw | s |||| 0|eng d
020 _a9783658073657
_9978-3-658-07365-7
024 7 _a10.1007/978-3-658-07365-7
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aUL
_2bicssc
072 7 _aCOM051230
_2bisacsh
082 0 4 _a005.1
_223
100 1 _aPetritsch, Helmut.
_eauthor.
245 1 0 _aBreak-Glass
_h[electronic resource] :
_bHandling Exceptional Situations in Access Control /
_cby Helmut Petritsch.
264 1 _aWiesbaden :
_bSpringer Fachmedien Wiesbaden :
_bImprint: Springer Vieweg,
_c2014.
300 _aXIII, 220 p. 15 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Background -- A Generic Break-Glass Model -- Policy Definition: Pre-Access -- User Information: At-Access -- Analysis: Post-Access -- Implementation -- Related Work -- Evaluation -- Discussion and Conclusion.
520 _aHelmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The presented model is generic both in the sense that it allows to model existing Break-Glass approaches and that it is independent of the underlying access control model. Contents Generic Break-Glass model and Break-Glass lifecycle Policy definition: pre-access User information, recording the system state: at-access Analysis: post-access  Target Groups Researchers and students in the field of computer science and access control, as well as scholars applying the concept of emergency access, e.g., in medical care  Application developers with demanding requirements regarding the access control system, e.g., using XACML; application architects for systems implementing emergency access About the Author Helmut Petritsch is currently working as developer of enterprise software at a German multinational company.
650 0 _aComputer science.
650 0 _aComputer organization.
650 0 _aSoftware engineering.
650 0 _aComputers.
650 1 4 _aComputer Science.
650 2 4 _aSoftware Engineering/Programming and Operating Systems.
650 2 4 _aComputing Methodologies.
650 2 4 _aComputer Systems Organization and Communication Networks.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783658073640
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-658-07365-7
912 _aZDB-2-SCS
942 _cEBK
999 _c54440
_d54440