Role engineering for enterprise security management
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلف مشترك: | |
| مؤلفون آخرون: | |
| التنسيق: | الكتروني كتاب الكتروني |
| اللغة: | الإنجليزية |
| منشور في: |
Boston :
Artech House,
2008.
|
| سلاسل: | Artech House information security and privacy series.
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | An electronic book accessible through the World Wide Web; click to view |
| الوسوم: |
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
جدول المحتويات:
- The business case for role-based access control
- Role engineering in the phases of the system development life cycle
- Role engineering and why we need it
- Defining good roles
- The role engineering process
- Designing the roles
- Engineering the permissions
- Tools that can be used to assist the role engineering process
- Putting it all together : the role formation process
- What others have been doing
- Planning a role engineering effort
- Staffing for role engineering
- What can go wrong and why?