|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910454389703321 |
|
|
Autore |
Ferraiolo David |
|
|
Titolo |
Role-based access control [[electronic resource] /] / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boston, : Artech House, c2007 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[2nd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (404 p.) |
|
|
|
|
|
|
Collana |
|
Artech House information security and privacy series |
|
|
|
|
|
|
Altri autori (Persone) |
|
ChandramouliRamaswamy |
KuhnD. Richard |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Access control |
Computer security |
Computers - Access control |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Contents; Preface; Acknowledgments; Chapter 1 Introduction; Chapter 2 Access Control: Properties, Policies, and Models; Chapter 3 Core RBAC Features; Chapter 4 Role Hierarchies; Chapter 5 SoD and Constraints in RBAC Systems; Chapter 6 RBAC, MAC, and DAC; Chapter 7 Privacy and Regulatory Issues; Chapter 8 RBAC Standards and Profiles; Chapter 9 Role-Based Administration of RBAC; Chapter 10 Role Engineering; Chapter 11 Enterprise Access Control Frameworks Using RBAC and XML Technologies; Chapter 12 Integrating RBAC with Enterprise IT Infrastructures |
Chapter 13 Migrating to RBAC-Case Study: Multiline Insurance CompanyChapter 14 RBAC Features in Commercial Products; Appendix A: XML Schema for the RBAC Model; Appendix B: XML-Encoded Data for RBAC Model |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners the very latest details on this popular network security |
|
|
|
|