Coyne, Edward J., PhD.
Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis. - Boston : Artech House, 2008. - xvii, 224 p. : ill., charts. - Artech House information security and privacy series . - Artech House information security and privacy series. .
Includes bibliographical references and index.
The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
Electronic reproduction.
Palo Alto, Calif. :
ebrary,
2013.
Available via World Wide Web.
Access may be limited to ebrary affiliated libraries.
Information resources management.
Computer networks--Access control.
Computer network architectures.
Management information systems.
Electronic books.
T58.64 / .C69 2008eb
Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis. - Boston : Artech House, 2008. - xvii, 224 p. : ill., charts. - Artech House information security and privacy series . - Artech House information security and privacy series. .
Includes bibliographical references and index.
The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
Electronic reproduction.
Palo Alto, Calif. :
ebrary,
2013.
Available via World Wide Web.
Access may be limited to ebrary affiliated libraries.
Information resources management.
Computer networks--Access control.
Computer network architectures.
Management information systems.
Electronic books.
T58.64 / .C69 2008eb