Role engineering for enterprise security management
I tiakina i:
Kaituhi matua: | |
---|---|
Kaituhi rangatōpū: | |
Ētahi atu kaituhi: | |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Boston :
Artech House,
2008.
|
Rangatū: | Artech House information security and privacy series.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- The business case for role-based access control
- Role engineering in the phases of the system development life cycle
- Role engineering and why we need it
- Defining good roles
- The role engineering process
- Designing the roles
- Engineering the permissions
- Tools that can be used to assist the role engineering process
- Putting it all together : the role formation process
- What others have been doing
- Planning a role engineering effort
- Staffing for role engineering
- What can go wrong and why?