Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis.
Series: Artech House information security and privacy seriesPublication details: Boston : Artech House, 2008.Description: xvii, 224 p. : ill., charts ; 24 cmSubject(s): Genre/Form: LOC classification:- T58.64 .C69 2008eb
Item type | Current library | Call number | URL | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
E-Book | Strathmore University (Main Library) Online Resource | Link to resource | Not for loan |
Includes bibliographical references and index.
The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
Electronic reproduction. Palo Alto, Calif. : ebrary, 2009. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.
There are no comments on this title.