Role engineering for enterprise security management / Edward J. Coyne, John M. Davis.

Saved in:
Bibliographic Details
Superior document:Artech House information security and privacy series
:
TeilnehmendeR:
Year of Publication:2008
Language:English
Series:Artech House information security and privacy series.
Online Access:
Physical Description:xvii, 224 p. :; ill., charts.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 500338774
ctrlnum (MiAaPQ)500338774
(Au-PeEL)EBL338774
(CaPaEBR)ebr10240780
(OCoLC)560506562
collection bib_alma
record_format marc
spelling Coyne, Edward J., PhD.
Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis.
Boston : Artech House, 2008.
xvii, 224 p. : ill., charts.
Artech House information security and privacy series
Includes bibliographical references and index.
The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Information resources management.
Computer networks Access control.
Computer network architectures.
Management information systems.
Electronic books.
Davis, John M.
ProQuest (Firm)
Artech House information security and privacy series.
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=338774 Click to View
language English
format Electronic
eBook
author Coyne, Edward J., PhD.
spellingShingle Coyne, Edward J., PhD.
Role engineering for enterprise security management
Artech House information security and privacy series
The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
author_facet Coyne, Edward J., PhD.
Davis, John M.
ProQuest (Firm)
ProQuest (Firm)
author_variant e j c ej ejc
author2 Davis, John M.
ProQuest (Firm)
author2_variant j m d jm jmd
author2_role TeilnehmendeR
TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort Coyne, Edward J., PhD.
title Role engineering for enterprise security management
title_full Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis.
title_fullStr Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis.
title_full_unstemmed Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis.
title_auth Role engineering for enterprise security management
title_new Role engineering for enterprise security management
title_sort role engineering for enterprise security management
series Artech House information security and privacy series
series2 Artech House information security and privacy series
publisher Artech House,
publishDate 2008
physical xvii, 224 p. : ill., charts.
contents The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
callnumber-first T - Technology
callnumber-subject T - General Technology
callnumber-label T58
callnumber-sort T 258.64 C69 42008
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=338774
illustrated Illustrated
oclc_num 560506562
work_keys_str_mv AT coyneedwardj roleengineeringforenterprisesecuritymanagement
AT davisjohnm roleengineeringforenterprisesecuritymanagement
AT proquestfirm roleengineeringforenterprisesecuritymanagement
status_str n
ids_txt_mv (MiAaPQ)500338774
(Au-PeEL)EBL338774
(CaPaEBR)ebr10240780
(OCoLC)560506562
hierarchy_parent_title Artech House information security and privacy series
is_hierarchy_title Role engineering for enterprise security management
container_title Artech House information security and privacy series
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1792330683509637120
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02058nam a22004094a 4500</leader><controlfield tag="001">500338774</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">080229s2008 mauad sb 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2008270416</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781596932180</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">159693218X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500338774</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL338774</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10240780</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560506562</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T58.64</subfield><subfield code="b">.C69 2008</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Coyne, Edward J.,</subfield><subfield code="c">PhD.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Role engineering for enterprise security management</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Edward J. Coyne, John M. Davis.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boston :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 224 p. :</subfield><subfield code="b">ill., charts.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information resources management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer network architectures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Management information systems.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Davis, John M.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House information security and privacy series.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=338774</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>