Abstract
Integrating a COTS product in a company’s product portfolio is appealing from a business perspective but highly challenging from the perspective of the software architecture. In this paper we outline research challenges regarding authorization in the identity management part of the Danish municipality administration system, called Opus BRS, a system that integrates SAP, legacy mainframe systems, and other systems present in the individual municipalities. Each of these systems defines their own access control model and architecture, which leads to architectural mismatch that impacts security, usability, as well as maintainability. We outline a three-year research project and discuss our research method that will include elements of action research as well as experiments using architectural prototyping. The project is carried out in cooperation with KMD, one of the largest Danish IT companies, who is the producer of the Opus system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bardram, J., Christensen, H., Hansen, K.: Architectural Prototyping: An Approach for Grounding Architectural Design and Learning. In: Proceedings of Fourth Working IEEE/IFIP Conference on Software Architecture. WICSA 2004, June 2004, pp. 15–24 (2004)
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3), 191–233 (2001)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)
Garlan, D., Allen, R., Ockerbloom, J.: Architectural Mismatch: Why Reuse is so Hard. IEEE Software 12(6), 17–26 (1995)
Garlan, D., Allen, R., Ockerbloom, J.: Architectural Mismatch: Why Reuse Is Still So Hard. IEEE Software 26(4), 66–69 (2009)
Joshi, J.B., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role-Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering 17, 4–23 (2005)
KMD, http://www.kmd.dk/
Linkies, M., Off, F.: SAP Security and Authorizations. SAP Press (2006)
Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control. In: International Conference on Distributed Computing Systems, p. 391 (2001)
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer 29(2), 38–47 (1996)
SAP, http://www.sap.com/
Sjøberg, D., Dyba, T., Jørgensen, M.: The Future of Empirical Methods in Software Engineering Research. In: Future of Software Engineering, FOSE 2007, May 2007, pp. 358–378 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Andersen, M.S., Christensen, H.B. (2010). Identity Management Mismatch Challenges in the Danish Municipality Administration System. In: Babar, M.A., Gorton, I. (eds) Software Architecture. ECSA 2010. Lecture Notes in Computer Science, vol 6285. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15114-9_44
Download citation
DOI: https://doi.org/10.1007/978-3-642-15114-9_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15113-2
Online ISBN: 978-3-642-15114-9
eBook Packages: Computer ScienceComputer Science (R0)