Break-Glass pp 37-50 | Cite as

A Generic Break-Glass Model



Our contributions are presented along the life cycle of a Break-Glass access as depicted in Figure 3.1: the Chapters 4-6, where the pre-, at-, and post-access phases of Break-Glass are presented, are based on our Break-Glass model presented in this chapter. In section 3.1, we will discuss the requirements constituting the characteristics of Break-Glass. Throughout the thesis, we will show how those requirements can be implemented. We will introduce our abstract Break-Glass model in section 3.2. The abstract model will be instantiated with two implementations: the core Break-Glass model in section 3.3 is based on our publication [27] and defines privileges only with positive, i. e., PERMIT, permissions; and the constraints Break-Glass model in section 3.4 which also allows to define constraining, i. e., DENY, permissions.




Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Fachmedien Wiesbaden 2014

Authors and Affiliations

  1. 1.Strategic Customer EngagementSAP AGWalldorfGermany

Personalised recommendations