Role engineering for enterprise security management

Wedi'i Gadw mewn:
Manylion Llyfryddiaeth
Prif Awdur: Coyne, Edward J., PhD
Awdur Corfforaethol: ebrary, Inc
Awduron Eraill: Davis, John M.
Fformat: Electronig eLyfr
Iaith:Saesneg
Cyhoeddwyd: Boston : Artech House, 2008.
Cyfres:Artech House information security and privacy series.
Pynciau:
Mynediad Ar-lein:An electronic book accessible through the World Wide Web; click to view
Tagiau: Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
Tabl Cynhwysion:
  • The business case for role-based access control
  • Role engineering in the phases of the system development life cycle
  • Role engineering and why we need it
  • Defining good roles
  • The role engineering process
  • Designing the roles
  • Engineering the permissions
  • Tools that can be used to assist the role engineering process
  • Putting it all together : the role formation process
  • What others have been doing
  • Planning a role engineering effort
  • Staffing for role engineering
  • What can go wrong and why?