LEADER 03242nam 2200661 450 001 9910780484403321 005 20230125182955.0 010 $a1-58053-324-8 035 $a(CKB)111087028225104 035 $a(EBL)227631 035 $a(OCoLC)559833863 035 $a(SSID)ssj0000239241 035 $a(PQKBManifestationID)11205802 035 $a(PQKBTitleCode)TC0000239241 035 $a(PQKBWorkID)10239282 035 $a(PQKB)10281487 035 $a(Au-PeEL)EBL227631 035 $a(CaPaEBR)ebr10081904 035 $a(CaBNVSL)mat09106075 035 $a(IEEE)9106075 035 $a(MiAaPQ)EBC227631 035 $a(EXLCZ)99111087028225104 100 $a20200729d2003 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRole-based access control /$fDavid F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli 205 $a2nd ed. 210 1$aBoston :$cArtech House,$dİ2003. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2003] 215 $a1 online resource (336 p.) 225 1 $aArtech House computer security series 300 $aDescription based upon print version of record. 311 $a1-58053-370-1 320 $aIncludes bibliographical references and index. 327 $aRole-Based Access Control; Contents vii; Preface xv; Acknowledgements xvii; Chapter 1 Introduction 1; Chapter 2 Access Control Policy, Models, and Mechanisms--Concepts and Examples 27; Chapter 3 Core RBAC Features 51; Chapter 4 Role Hierachies 67; Chapter 5 SoD and Constraints in RBAC Systems 91; Chapter 6 RBAC, MAC, and DAC 121; Chapter 7 NIST's Proposed RBAC Standard 141; Chapter 8 Role-Based Administration of RBAC 155; Chapter 9 Enterprise Access Control Framework Using RBAC and XML Technologies 179; Chapter 10 Integrating RBAC with Enterprise IT Infrastructures 211 327 $aChapter 11 Migrating to RBAC--Case Study: Multiline Insurance Company 255Chapter 12 RBAC Features in Commercial Products 265; References 293; Appendix A 295; Appendix B 299; About the authors 303; Index 305 330 3 $aRole-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer RBAC in a networked environment and how to integrate it with existing infrastructure.$cPublisher abstract. 410 0$aArtech House computer security series. 606 $aComputers$xAccess control 606 $aComputer security 606 $aComputer networks$xAccess control 615 0$aComputers$xAccess control. 615 0$aComputer security. 615 0$aComputer networks$xAccess control. 676 $a005.8 700 $aFerraiolo$b David$01162179 701 $aKuhn$b D. Richard$01162181 701 $aChandramouli$b Ramaswamy$01162180 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910780484403321 996 $aRole-based access control$93712380 997 $aUNINA