TY - GEN
T1 - Managing the life cycle of access rules in CEOSIS
AU - Rinderle-Ma, Stefanie
AU - Reichert, Manfred
PY - 2008
Y1 - 2008
N2 - The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information systems (EIS). Many EIS apply role-based access control (RBAC) mechanisms to specify access rules based on organizational models. However, only little research has been spent on organizational changes even though they often become necessary in practice. Examples comprise the evolution of organizational models with subsequent adaptation of access rules or direct access rule modifications. In this paper, we present a change framework for the controlled evolution of access rules in EIS. Specifically, we define change operations which ensure correct modification of access rules. Finally, we define the formal semantics of access rule changes based on operator trees which enables their unambiguous application; i.e., we can precisely determine which effects are caused by respective adaptations. This is important, for example, to be able to efficiently adapt user worklists in process-aware information systems. Altogether this paper contributes to comprehensive life cycle support for access rules in (adaptive) EIS.
AB - The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information systems (EIS). Many EIS apply role-based access control (RBAC) mechanisms to specify access rules based on organizational models. However, only little research has been spent on organizational changes even though they often become necessary in practice. Examples comprise the evolution of organizational models with subsequent adaptation of access rules or direct access rule modifications. In this paper, we present a change framework for the controlled evolution of access rules in EIS. Specifically, we define change operations which ensure correct modification of access rules. Finally, we define the formal semantics of access rule changes based on operator trees which enables their unambiguous application; i.e., we can precisely determine which effects are caused by respective adaptations. This is important, for example, to be able to efficiently adapt user worklists in process-aware information systems. Altogether this paper contributes to comprehensive life cycle support for access rules in (adaptive) EIS.
UR - http://www.scopus.com/inward/record.url?scp=56649119135&partnerID=8YFLogxK
U2 - 10.1109/EDOC.2008.16
DO - 10.1109/EDOC.2008.16
M3 - Conference contribution
AN - SCOPUS:56649119135
SN - 9780769533735
T3 - Proceedings - 12th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2008
SP - 257
EP - 266
BT - Proceedings - 12th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2008
T2 - 12th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2008
Y2 - 15 September 2008 through 19 September 2008
ER -