LEADER 03965nam 22006495 450 001 9910298970303321 005 20200702072505.0 010 $a3-658-07365-9 024 7 $a10.1007/978-3-658-07365-7 035 $a(CKB)3710000000244773 035 $a(EBL)1965822 035 $a(OCoLC)908084632 035 $a(SSID)ssj0001353811 035 $a(PQKBManifestationID)11733440 035 $a(PQKBTitleCode)TC0001353811 035 $a(PQKBWorkID)11317242 035 $a(PQKB)10568398 035 $a(MiAaPQ)EBC1965822 035 $a(DE-He213)978-3-658-07365-7 035 $a(PPN)181348896 035 $a(EXLCZ)993710000000244773 100 $a20140919d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBreak-Glass $eHandling Exceptional Situations in Access Control /$fby Helmut Petritsch 205 $a1st ed. 2014. 210 1$aWiesbaden :$cSpringer Fachmedien Wiesbaden :$cImprint: Springer Vieweg,$d2014. 215 $a1 online resource (224 p.) 300 $aDescription based upon print version of record. 311 $a3-658-07364-0 320 $aIncludes bibliographical references. 327 $aIntroduction -- Background -- A Generic Break-Glass Model -- Policy De?nition: Pre-Access -- User Information: At-Access -- Analysis: Post-Access -- Implementation -- Related Work -- Evaluation -- Discussion and Conclusion. 330 $aHelmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The presented model is generic both in the sense that it allows to model existing Break-Glass approaches and that it is independent of the underlying access control model. Contents Generic Break-Glass model and Break-Glass lifecycle Policy definition: pre-access User information, recording the system state: at-access Analysis: post-access  Target Groups Researchers and students in the field of computer science and access control, as well as scholars applying the concept of emergency access, e.g., in medical care  Application developers with demanding requirements regarding the access control system, e.g., using XACML; application architects for systems implementing emergency access About the Author Helmut Petritsch is currently working as developer of enterprise software at a German multinational company. 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aComputer organization 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aComputer organization. 615 14$aSoftware Engineering/Programming and Operating Systems. 615 24$aArtificial Intelligence. 615 24$aComputer Systems Organization and Communication Networks. 676 $a004 676 $a004.6 676 $a005.1 676 $a006 700 $aPetritsch$b Helmut$4aut$4http://id.loc.gov/vocabulary/relators/aut$0875222 906 $aBOOK 912 $a9910298970303321 996 $aBreak-Glass$91953987 997 $aUNINA