Managing the life cycle of access rules in CEOSIS

Stefanie Rinderle-Ma, Manfred Reichert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Scopus citations

Abstract

The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information systems (EIS). Many EIS apply role-based access control (RBAC) mechanisms to specify access rules based on organizational models. However, only little research has been spent on organizational changes even though they often become necessary in practice. Examples comprise the evolution of organizational models with subsequent adaptation of access rules or direct access rule modifications. In this paper, we present a change framework for the controlled evolution of access rules in EIS. Specifically, we define change operations which ensure correct modification of access rules. Finally, we define the formal semantics of access rule changes based on operator trees which enables their unambiguous application; i.e., we can precisely determine which effects are caused by respective adaptations. This is important, for example, to be able to efficiently adapt user worklists in process-aware information systems. Altogether this paper contributes to comprehensive life cycle support for access rules in (adaptive) EIS.

Original languageEnglish
Title of host publicationProceedings - 12th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2008
Pages257-266
Number of pages10
DOIs
StatePublished - 2008
Externally publishedYes
Event12th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2008 - Munich, Germany
Duration: 15 Sep 200819 Sep 2008

Publication series

NameProceedings - 12th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2008

Conference

Conference12th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2008
Country/TerritoryGermany
CityMunich
Period15/09/0819/09/08

Fingerprint

Dive into the research topics of 'Managing the life cycle of access rules in CEOSIS'. Together they form a unique fingerprint.

Cite this