SIM : An Innovative Business-Oriented Approach for a Distributed Access Management

Jocelyn Aubert, Benjamin Gateau, Christophe Incoul, Christophe Feltus

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

42 Downloads (Pure)

Abstract

The generalization of open and distributed system and the dynamicity of the environment make the Information Systems (IS) and consequently its access right management always more complex. Even if the support of this activity appears to be well handed by current sophisticated solutions, the definition and the exploitation of an access right management framework appropriately adapted for a company remains challenging. This statement is explained mainly by the continuous grow of the diversity of stakeholders' statuses and by the criticality of the resources to protect. To face that problem, the objectives of this paper are twofold. Firstly to make right management closer with business objectives by providing an innovative approach that focus on business goals for defining access policy. The ISO/IEC 15504 process-based model organization has been preferred for that research. Indeed, the structured framework that it offers for the description of activities allows to established meaningful links with responsibilities concepts. Secondly, to automate the deployment of policies through the infrastructure's components and devices by defining a multi-agent system architecture that provides autonomy and adaptability. Free and open source components have been privileged for the prototyping phase.
Original languageEnglish
Title of host publicationProceeding of 3rd international conference on information and communication technologies : from theory to applications (ICTTA 08), Damascus, Syria
Pages1-6
Number of pages6
DOIs
Publication statusPublished - 2008

Keywords

  • Policy engineering
  • Business IT-alignment
  • Identity management
  • Agent-based architecture

Fingerprint

Dive into the research topics of 'SIM : An Innovative Business-Oriented Approach for a Distributed Access Management'. Together they form a unique fingerprint.

Cite this