Logo des Repositoriums
 

A user-centric approach to IT-security risk analysis for an identity management solution

dc.contributor.authorFähnrich, Nicolas
dc.contributor.authorWinterstetter, Matthias
dc.contributor.authorKubach, Michael
dc.contributor.editorRoßnagel, Heiko
dc.contributor.editorSchunck, Christian H.
dc.contributor.editorMödersheim, Sebastian
dc.date.accessioned2022-06-07T07:04:34Z
dc.date.available2022-06-07T07:04:34Z
dc.date.issued2022
dc.description.abstractIn order to build identity management (IdM) solutions that are secure in the practical application context, a holistic approach their IT-security risk analysis is required. This complements the indispensable technical, and crypto-focused analysis of risks and vulnerabilities with an approach that puts another important vector for security in the center: the users and their usage of the technology over the whole lifecycle. In our short paper we focus exclusively on the user-centric approach and present an IT-security risk analysis that is structured around the IdM lifecycle.en
dc.identifier.doi10.18420/OID2022_09
dc.identifier.isbn978-3-88579-719-7
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/38709
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofOpen Identity Summit 2022
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-305
dc.subjectidentity lifecycle
dc.subjectuser-centric
dc.subjectrisk analysis
dc.subjectIT-security
dc.subjectcybersecurity
dc.subjectsocial engineering
dc.titleA user-centric approach to IT-security risk analysis for an identity management solutionen
dc.typeText/Conference Paper
gi.citation.endPage118
gi.citation.publisherPlaceBonn
gi.citation.startPage113
gi.conference.date07.-08. July 2022
gi.conference.locationCopenhagen, Denmark
gi.conference.sessiontitleShort Paper

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
proceedings-09.pdf
Größe:
235.32 KB
Format:
Adobe Portable Document Format