Role engineering for enterprise security management / Edward J. Coyne, John M. Davis.
Saved in:
Superior document: | Artech House information security and privacy series |
---|---|
: | |
TeilnehmendeR: | |
Year of Publication: | 2008 |
Language: | English |
Series: | Artech House information security and privacy series.
|
Online Access: | |
Physical Description: | xvii, 224 p. :; ill., charts. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500338774 |
---|---|
ctrlnum |
(MiAaPQ)500338774 (Au-PeEL)EBL338774 (CaPaEBR)ebr10240780 (OCoLC)560506562 |
collection |
bib_alma |
record_format |
marc |
spelling |
Coyne, Edward J., PhD. Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis. Boston : Artech House, 2008. xvii, 224 p. : ill., charts. Artech House information security and privacy series Includes bibliographical references and index. The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why? Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Information resources management. Computer networks Access control. Computer network architectures. Management information systems. Electronic books. Davis, John M. ProQuest (Firm) Artech House information security and privacy series. https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=338774 Click to View |
language |
English |
format |
Electronic eBook |
author |
Coyne, Edward J., PhD. |
spellingShingle |
Coyne, Edward J., PhD. Role engineering for enterprise security management Artech House information security and privacy series The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why? |
author_facet |
Coyne, Edward J., PhD. Davis, John M. ProQuest (Firm) ProQuest (Firm) |
author_variant |
e j c ej ejc |
author2 |
Davis, John M. ProQuest (Firm) |
author2_variant |
j m d jm jmd |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Coyne, Edward J., PhD. |
title |
Role engineering for enterprise security management |
title_full |
Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis. |
title_fullStr |
Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis. |
title_full_unstemmed |
Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis. |
title_auth |
Role engineering for enterprise security management |
title_new |
Role engineering for enterprise security management |
title_sort |
role engineering for enterprise security management |
series |
Artech House information security and privacy series |
series2 |
Artech House information security and privacy series |
publisher |
Artech House, |
publishDate |
2008 |
physical |
xvii, 224 p. : ill., charts. |
contents |
The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why? |
callnumber-first |
T - Technology |
callnumber-subject |
T - General Technology |
callnumber-label |
T58 |
callnumber-sort |
T 258.64 C69 42008 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=338774 |
illustrated |
Illustrated |
oclc_num |
560506562 |
work_keys_str_mv |
AT coyneedwardj roleengineeringforenterprisesecuritymanagement AT davisjohnm roleengineeringforenterprisesecuritymanagement AT proquestfirm roleengineeringforenterprisesecuritymanagement |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500338774 (Au-PeEL)EBL338774 (CaPaEBR)ebr10240780 (OCoLC)560506562 |
hierarchy_parent_title |
Artech House information security and privacy series |
is_hierarchy_title |
Role engineering for enterprise security management |
container_title |
Artech House information security and privacy series |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1792330683509637120 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02058nam a22004094a 4500</leader><controlfield tag="001">500338774</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">080229s2008 mauad sb 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2008270416</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781596932180</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">159693218X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500338774</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL338774</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10240780</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560506562</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T58.64</subfield><subfield code="b">.C69 2008</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Coyne, Edward J.,</subfield><subfield code="c">PhD.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Role engineering for enterprise security management</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Edward J. Coyne, John M. Davis.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boston :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 224 p. :</subfield><subfield code="b">ill., charts.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information resources management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer network architectures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Management information systems.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Davis, John M.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House information security and privacy series.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=338774</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |