Role engineering for enterprise security management
Saved in:
| 主要作者: | |
|---|---|
| 企業作者: | |
| 其他作者: | |
| 格式: | 電子 電子書 |
| 語言: | 英语 |
| 出版: |
Boston :
Artech House,
2008.
|
| 叢編: | Artech House information security and privacy series.
|
| 主題: | |
| 在線閱讀: | An electronic book accessible through the World Wide Web; click to view |
| 標簽: |
沒有標簽, 成為第一個標記此記錄!
|
書本目錄:
- The business case for role-based access control
- Role engineering in the phases of the system development life cycle
- Role engineering and why we need it
- Defining good roles
- The role engineering process
- Designing the roles
- Engineering the permissions
- Tools that can be used to assist the role engineering process
- Putting it all together : the role formation process
- What others have been doing
- Planning a role engineering effort
- Staffing for role engineering
- What can go wrong and why?