Role engineering for enterprise security management / Edward J. Coyne, John M. Davis.
Saved in:
Superior document: | Artech House information security and privacy series |
---|---|
: | |
TeilnehmendeR: | |
Year of Publication: | 2008 |
Language: | English |
Series: | Artech House information security and privacy series.
|
Online Access: | |
Physical Description: | xvii, 224 p. :; ill., charts. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- The business case for role-based access control
- Role engineering in the phases of the system development life cycle
- Role engineering and why we need it
- Defining good roles
- The role engineering process
- Designing the roles
- Engineering the permissions
- Tools that can be used to assist the role engineering process
- Putting it all together : the role formation process
- What others have been doing
- Planning a role engineering effort
- Staffing for role engineering
- What can go wrong and why?