Role engineering for enterprise security management
Uloženo v:
Hlavní autor: | |
---|---|
Korporativní autor: | |
Další autoři: | |
Médium: | Elektronický zdroj E-kniha |
Jazyk: | angličtina |
Vydáno: |
Boston :
Artech House,
2008.
|
Edice: | Artech House information security and privacy series.
|
Témata: | |
On-line přístup: | An electronic book accessible through the World Wide Web; click to view |
Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
Obsah:
- The business case for role-based access control
- Role engineering in the phases of the system development life cycle
- Role engineering and why we need it
- Defining good roles
- The role engineering process
- Designing the roles
- Engineering the permissions
- Tools that can be used to assist the role engineering process
- Putting it all together : the role formation process
- What others have been doing
- Planning a role engineering effort
- Staffing for role engineering
- What can go wrong and why?