Role engineering for enterprise security management

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi matua: Coyne, Edward J., PhD
Kaituhi rangatōpū: ebrary, Inc
Ētahi atu kaituhi: Davis, John M.
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: Boston : Artech House, 2008.
Rangatū:Artech House information security and privacy series.
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Rārangi ihirangi:
  • The business case for role-based access control
  • Role engineering in the phases of the system development life cycle
  • Role engineering and why we need it
  • Defining good roles
  • The role engineering process
  • Designing the roles
  • Engineering the permissions
  • Tools that can be used to assist the role engineering process
  • Putting it all together : the role formation process
  • What others have been doing
  • Planning a role engineering effort
  • Staffing for role engineering
  • What can go wrong and why?