SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
gefördert durch das Kompetenzzentrenprogramm
Heimo Gursch
Some Thoughts and Aspects on Access Control
Related Issues for Enterprise Recommender
Systems
www.know-center.at
10 July 2013
Workshop on Academic-Industrial Collaborations for Recommender Systems
© Know-Center 2013
Thoughts on Access
Control in Enterprise
Recommender Systems
© Know-Center 2013
2
Agenda
 What am I working on?
 Why are we working on that?
 What are the major concerns?
 Access Control
 What are the problems?
 What can be done about it?
 Recommender
 Why use them?
 What can they achieve?
© Know-Center 2013
3
Our Project & my background
 Project Setting
 Four large German Companies
 Amounts of information is increasing
 Enterprise search is not enough
 Project Goals
 Single entry point to all information
 Help engineers to find whatever they are looking for
 Create a prototype that is capable of
 Enterprise Search
 Recommender
 Extract, show and use relations between data
© Know-Center 2013
4
The Problems – Company Policy
© Know-Center 2013
5
The Problems – What is Going on
© Know-Center 2013
6
The big trade-off
 Current situation is unsatisfying
 Recommender would bring “too much” information
 Recommend to user only Information where access is
possible
Closed Open
Information
© Know-Center 2013
7
Access Control Concerns
 Access Control is a “necessary evil” to ensure
 Confidentiality
 Traceability
 Status quo
 Role based access control (RBAC)[1]
 1000s of roles
 SSO only over some systems
 Problems when changes are necessary
 Solutions
 Adapt the current system
 Start over clean…
[1] D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls”, in 15th National Computer Security Conference, 1992,
Baltimore MD, Pages 554-563
© Know-Center 2013
8
Possible Solutions[2]
 Attribute Based Access Control
 Problem: Decide on attributes
 Authorization Based Access Control
 Abbreviated ABAC or ZBAC
 User checks out token to get access
 Token holds all the information needed by target systems
 Token or parts of it can be passed on
 First realization[3]
 SOAP Messages with X.509 Certificate
[2] A.H. Karp, H. Haury, and M.H. Davis, “From ABAC to ZBAC: The Evolution of Access Control Models From ABAC to ZBAC”,
2009
[3] J. Li and A. H. Karp, “Zebra Copy : A Reference Implementation of Federated Access Management 1”, 2007
© Know-Center 2013
9
Bring in the Recommender…
 Recommender can help with questions like…
 Has anybody done something with…
 Give me more like that
 Combining -based Recommenders
 Content-based: Short-term model
 Knowledge-based: Long-term model
 “Knowledge”
 Job description
 Assigned tasks
 …
Content
Knowledge
© Know-Center 2013
10
Content & Knowledge-based
Recommender
 User independent  Serendipity problem
 Model overcomes the new
user problem
 Limitation of content
analyse
 Fast integration of new
items
 Tweaks by the user are
possible
 Changing user interest
© Know-Center 2013
11
Combine Recommender & Access Control
 Criteria for the solution
 High-performance solution that is parallelisable
 Ensure access control in any case
 Possible solutions
 Check access control before anything else is done
 Use a multi-criteria recommender system
 Multi-criteria recommender system
 Define a aggregation function
 Base recommendation on
 Access control
 Short-time model
 Long-time model
© Know-Center 2013
12
Key aspect for success
 Give possible solution
 Show that infrastructure is the result of the problem not the
cause
 Need to know vs. good to know
 Show potential
 Produce a prototype that consists of
 Search
 Recommender
 Access-control concepts
© Know-Center 2013
13
Summary & Closing Arguments
 Project Settings
 Problems and the current situation at our partners
 User/role management
 Information needs of employees
 Situation we work towards
 Change access management
 Introduce the recommender systems
 Improve enterprise search that employees actuality use it
gefördert durch das Kompetenzzentrenprogramm
Heimo Gursch
Some Thoughts and Aspects on Access Control
Related Issues for Enterprise Recommender
Systems
www.know-center.at
10 July 2013
Workshop on Academic-Industrial Collaborations for Recommender Systems
© Know-Center 2013
Thoughts on Access
Control in Enterprise
Recommender Systems

Weitere ähnliche Inhalte

Was ist angesagt?

EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer ChecklistAnita Amelia
 
Considerations Checklist: What is High Availability (HA)?
Considerations Checklist: What is High Availability (HA)?Considerations Checklist: What is High Availability (HA)?
Considerations Checklist: What is High Availability (HA)?Collaborative Consulting
 
SLBdiensten XP sessie: presentatie Microsoft Services
SLBdiensten XP sessie: presentatie Microsoft ServicesSLBdiensten XP sessie: presentatie Microsoft Services
SLBdiensten XP sessie: presentatie Microsoft ServicesSLBdiensten
 
Mshi week8: What are the issues and challenges in implementing electronic hea...
Mshi week8: What are the issues and challenges in implementing electronic hea...Mshi week8: What are the issues and challenges in implementing electronic hea...
Mshi week8: What are the issues and challenges in implementing electronic hea...jgfabia
 
Sneha Summary Resume Final
Sneha Summary Resume FinalSneha Summary Resume Final
Sneha Summary Resume FinalSneha Patel
 
Applying Architecture Design for Information Delivery - HC
Applying Architecture Design for Information Delivery - HCApplying Architecture Design for Information Delivery - HC
Applying Architecture Design for Information Delivery - HCHuman Managed
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
A common architecture framework for UAE Educational
A common architecture framework for UAE Educational A common architecture framework for UAE Educational
A common architecture framework for UAE Educational Luqman Kondeth
 

Was ist angesagt? (10)

EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer Checklist
 
Heuristic evaluation
Heuristic evaluationHeuristic evaluation
Heuristic evaluation
 
Considerations Checklist: What is High Availability (HA)?
Considerations Checklist: What is High Availability (HA)?Considerations Checklist: What is High Availability (HA)?
Considerations Checklist: What is High Availability (HA)?
 
SLBdiensten XP sessie: presentatie Microsoft Services
SLBdiensten XP sessie: presentatie Microsoft ServicesSLBdiensten XP sessie: presentatie Microsoft Services
SLBdiensten XP sessie: presentatie Microsoft Services
 
Mshi week8: What are the issues and challenges in implementing electronic hea...
Mshi week8: What are the issues and challenges in implementing electronic hea...Mshi week8: What are the issues and challenges in implementing electronic hea...
Mshi week8: What are the issues and challenges in implementing electronic hea...
 
Sneha Summary Resume Final
Sneha Summary Resume FinalSneha Summary Resume Final
Sneha Summary Resume Final
 
PairWise introduction
PairWise introductionPairWise introduction
PairWise introduction
 
Applying Architecture Design for Information Delivery - HC
Applying Architecture Design for Information Delivery - HCApplying Architecture Design for Information Delivery - HC
Applying Architecture Design for Information Delivery - HC
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
A common architecture framework for UAE Educational
A common architecture framework for UAE Educational A common architecture framework for UAE Educational
A common architecture framework for UAE Educational
 

Ähnlich wie Thoughts on Access Control in Enterprise Recommender Systems

Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...Rundeck
 
The Challenges of BIG Testing: Automation, Virtualization, Outsourcing, and More
The Challenges of BIG Testing: Automation, Virtualization, Outsourcing, and MoreThe Challenges of BIG Testing: Automation, Virtualization, Outsourcing, and More
The Challenges of BIG Testing: Automation, Virtualization, Outsourcing, and MoreTechWell
 
Confessions of an HR Executive
Confessions of an HR ExecutiveConfessions of an HR Executive
Confessions of an HR Executivehdonbrown
 
Webinar - Design Thinking for Platform Engineering
Webinar - Design Thinking for Platform EngineeringWebinar - Design Thinking for Platform Engineering
Webinar - Design Thinking for Platform EngineeringOpenCredo
 
Top 5 Tips to Cut the Effort of your Oracle EBS R12 Project by a Third
Top 5 Tips to Cut the Effort of your Oracle EBS R12 Project by a ThirdTop 5 Tips to Cut the Effort of your Oracle EBS R12 Project by a Third
Top 5 Tips to Cut the Effort of your Oracle EBS R12 Project by a ThirdOriginal Software
 
FATE_Foundation_it-strategy-oct2013-part1
FATE_Foundation_it-strategy-oct2013-part1FATE_Foundation_it-strategy-oct2013-part1
FATE_Foundation_it-strategy-oct2013-part1Aide Ojigbede
 
Cloud watch on hrms solutions q2 2013_final_10072013 pre-read
Cloud watch on hrms solutions q2 2013_final_10072013 pre-readCloud watch on hrms solutions q2 2013_final_10072013 pre-read
Cloud watch on hrms solutions q2 2013_final_10072013 pre-readRonald van den Berg
 
Oracle Fusion HCM Presentation
Oracle Fusion HCM PresentationOracle Fusion HCM Presentation
Oracle Fusion HCM PresentationFeras Ahmad
 
Adaptive Case Management – Delivering Right Customer Experience
Adaptive Case Management – Delivering Right Customer ExperienceAdaptive Case Management – Delivering Right Customer Experience
Adaptive Case Management – Delivering Right Customer ExperienceAjay Khanna
 
Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Prolifics
 
St josephs project management
St josephs project managementSt josephs project management
St josephs project managementDavid Terry
 
IT Project Management
IT Project ManagementIT Project Management
IT Project ManagementDavid Terry
 
Project management
Project managementProject management
Project managementDavid Terry
 
Versioning: It's more than just for software
Versioning: It's more than just for software Versioning: It's more than just for software
Versioning: It's more than just for software Perforce
 
Delivering Enterprise Business Solutions in the Era of Cloud Computing
Delivering Enterprise Business Solutions in the Era of Cloud ComputingDelivering Enterprise Business Solutions in the Era of Cloud Computing
Delivering Enterprise Business Solutions in the Era of Cloud ComputingEric Shupps
 
Adopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliveryAdopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliverySOASTA
 
Linked data the next 5 years - From Hype to Action
Linked data the next 5 years - From Hype to ActionLinked data the next 5 years - From Hype to Action
Linked data the next 5 years - From Hype to ActionAndreas Blumauer
 
Success Factors of FOSS Adoption
Success Factors of FOSS AdoptionSuccess Factors of FOSS Adoption
Success Factors of FOSS AdoptionAlexei Fedotov
 

Ähnlich wie Thoughts on Access Control in Enterprise Recommender Systems (20)

Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
 
The Challenges of BIG Testing: Automation, Virtualization, Outsourcing, and More
The Challenges of BIG Testing: Automation, Virtualization, Outsourcing, and MoreThe Challenges of BIG Testing: Automation, Virtualization, Outsourcing, and More
The Challenges of BIG Testing: Automation, Virtualization, Outsourcing, and More
 
Confessions of an HR Executive
Confessions of an HR ExecutiveConfessions of an HR Executive
Confessions of an HR Executive
 
Webinar - Design Thinking for Platform Engineering
Webinar - Design Thinking for Platform EngineeringWebinar - Design Thinking for Platform Engineering
Webinar - Design Thinking for Platform Engineering
 
Top 5 Tips to Cut the Effort of your Oracle EBS R12 Project by a Third
Top 5 Tips to Cut the Effort of your Oracle EBS R12 Project by a ThirdTop 5 Tips to Cut the Effort of your Oracle EBS R12 Project by a Third
Top 5 Tips to Cut the Effort of your Oracle EBS R12 Project by a Third
 
FATE_Foundation_it-strategy-oct2013-part1
FATE_Foundation_it-strategy-oct2013-part1FATE_Foundation_it-strategy-oct2013-part1
FATE_Foundation_it-strategy-oct2013-part1
 
Cloud watch on hrms solutions q2 2013_final_10072013 pre-read
Cloud watch on hrms solutions q2 2013_final_10072013 pre-readCloud watch on hrms solutions q2 2013_final_10072013 pre-read
Cloud watch on hrms solutions q2 2013_final_10072013 pre-read
 
Oracle Fusion HCM Presentation
Oracle Fusion HCM PresentationOracle Fusion HCM Presentation
Oracle Fusion HCM Presentation
 
Adaptive Case Management – Delivering Right Customer Experience
Adaptive Case Management – Delivering Right Customer ExperienceAdaptive Case Management – Delivering Right Customer Experience
Adaptive Case Management – Delivering Right Customer Experience
 
Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change
 
St josephs project management
St josephs project managementSt josephs project management
St josephs project management
 
IT Project Management
IT Project ManagementIT Project Management
IT Project Management
 
Project management
Project managementProject management
Project management
 
Versioning: It's more than just for software
Versioning: It's more than just for software Versioning: It's more than just for software
Versioning: It's more than just for software
 
Delivering Enterprise Business Solutions in the Era of Cloud Computing
Delivering Enterprise Business Solutions in the Era of Cloud ComputingDelivering Enterprise Business Solutions in the Era of Cloud Computing
Delivering Enterprise Business Solutions in the Era of Cloud Computing
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Adopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliveryAdopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous Delivery
 
Neville Fuller
Neville FullerNeville Fuller
Neville Fuller
 
Linked data the next 5 years - From Hype to Action
Linked data the next 5 years - From Hype to ActionLinked data the next 5 years - From Hype to Action
Linked data the next 5 years - From Hype to Action
 
Success Factors of FOSS Adoption
Success Factors of FOSS AdoptionSuccess Factors of FOSS Adoption
Success Factors of FOSS Adoption
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Thoughts on Access Control in Enterprise Recommender Systems

  • 1. gefördert durch das Kompetenzzentrenprogramm Heimo Gursch Some Thoughts and Aspects on Access Control Related Issues for Enterprise Recommender Systems www.know-center.at 10 July 2013 Workshop on Academic-Industrial Collaborations for Recommender Systems © Know-Center 2013 Thoughts on Access Control in Enterprise Recommender Systems
  • 2. © Know-Center 2013 2 Agenda  What am I working on?  Why are we working on that?  What are the major concerns?  Access Control  What are the problems?  What can be done about it?  Recommender  Why use them?  What can they achieve?
  • 3. © Know-Center 2013 3 Our Project & my background  Project Setting  Four large German Companies  Amounts of information is increasing  Enterprise search is not enough  Project Goals  Single entry point to all information  Help engineers to find whatever they are looking for  Create a prototype that is capable of  Enterprise Search  Recommender  Extract, show and use relations between data
  • 4. © Know-Center 2013 4 The Problems – Company Policy
  • 5. © Know-Center 2013 5 The Problems – What is Going on
  • 6. © Know-Center 2013 6 The big trade-off  Current situation is unsatisfying  Recommender would bring “too much” information  Recommend to user only Information where access is possible Closed Open Information
  • 7. © Know-Center 2013 7 Access Control Concerns  Access Control is a “necessary evil” to ensure  Confidentiality  Traceability  Status quo  Role based access control (RBAC)[1]  1000s of roles  SSO only over some systems  Problems when changes are necessary  Solutions  Adapt the current system  Start over clean… [1] D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls”, in 15th National Computer Security Conference, 1992, Baltimore MD, Pages 554-563
  • 8. © Know-Center 2013 8 Possible Solutions[2]  Attribute Based Access Control  Problem: Decide on attributes  Authorization Based Access Control  Abbreviated ABAC or ZBAC  User checks out token to get access  Token holds all the information needed by target systems  Token or parts of it can be passed on  First realization[3]  SOAP Messages with X.509 Certificate [2] A.H. Karp, H. Haury, and M.H. Davis, “From ABAC to ZBAC: The Evolution of Access Control Models From ABAC to ZBAC”, 2009 [3] J. Li and A. H. Karp, “Zebra Copy : A Reference Implementation of Federated Access Management 1”, 2007
  • 9. © Know-Center 2013 9 Bring in the Recommender…  Recommender can help with questions like…  Has anybody done something with…  Give me more like that  Combining -based Recommenders  Content-based: Short-term model  Knowledge-based: Long-term model  “Knowledge”  Job description  Assigned tasks  … Content Knowledge
  • 10. © Know-Center 2013 10 Content & Knowledge-based Recommender  User independent  Serendipity problem  Model overcomes the new user problem  Limitation of content analyse  Fast integration of new items  Tweaks by the user are possible  Changing user interest
  • 11. © Know-Center 2013 11 Combine Recommender & Access Control  Criteria for the solution  High-performance solution that is parallelisable  Ensure access control in any case  Possible solutions  Check access control before anything else is done  Use a multi-criteria recommender system  Multi-criteria recommender system  Define a aggregation function  Base recommendation on  Access control  Short-time model  Long-time model
  • 12. © Know-Center 2013 12 Key aspect for success  Give possible solution  Show that infrastructure is the result of the problem not the cause  Need to know vs. good to know  Show potential  Produce a prototype that consists of  Search  Recommender  Access-control concepts
  • 13. © Know-Center 2013 13 Summary & Closing Arguments  Project Settings  Problems and the current situation at our partners  User/role management  Information needs of employees  Situation we work towards  Change access management  Introduce the recommender systems  Improve enterprise search that employees actuality use it
  • 14. gefördert durch das Kompetenzzentrenprogramm Heimo Gursch Some Thoughts and Aspects on Access Control Related Issues for Enterprise Recommender Systems www.know-center.at 10 July 2013 Workshop on Academic-Industrial Collaborations for Recommender Systems © Know-Center 2013 Thoughts on Access Control in Enterprise Recommender Systems