IUKL Library
Coyne, Edward J., PhD.

Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis. - Boston : Artech House, 2008. - xvii, 224 p. : ill., charts ; 24 cm. - Artech House information security and privacy series . - Artech House information security and privacy series. .

Includes bibliographical references and index.

The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?


Electronic reproduction.
Palo Alto, Calif. :
ebrary,
2009.
Available via World Wide Web.
Access may be limited to ebrary affiliated libraries.






Information resources management.
Computer networks--Access control.
Computer network architectures.
Management information systems.


Electronic books.

T58.64 / .C69 2008eb
The Library's homepage is at http://library.iukl.edu.my/.