How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization.
Steffen BartschMartina Angela SassePublished in: ECIS (2013)
Keyphrases
- access control
- access control mechanism
- fine grained
- dynamic access control
- role based access control
- security mechanisms
- data security
- security policies
- unauthorized access
- access control models
- access control policies
- role based access control model
- security model
- trust relationships
- usage control
- identity management
- security architecture
- security requirements
- role assignment
- end users
- rbac model
- access control systems
- trust management
- user centric
- information systems