LEADER 03070nam 2200625Ia 450 001 9910782015203321 005 20200520144314.0 010 $a1-59693-114-0 035 $a(CKB)1000000000533980 035 $a(EBL)338751 035 $a(OCoLC)437208190 035 $a(SSID)ssj0000239240 035 $a(PQKBManifestationID)11218777 035 $a(PQKBTitleCode)TC0000239240 035 $a(PQKBWorkID)10253403 035 $a(PQKB)10666530 035 $a(Au-PeEL)EBL338751 035 $a(CaPaEBR)ebr10240793 035 $a(MiAaPQ)EBC338751 035 $a(EXLCZ)991000000000533980 100 $a20070502d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRole-based access control$b[electronic resource] /$fDavid F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli 205 $a2nd ed. 210 $aBoston $cArtech House$dc2007 215 $a1 online resource (404 p.) 225 1 $aArtech House information security and privacy series 300 $aDescription based upon print version of record. 311 $a1-59693-113-2 320 $aIncludes bibliographical references and index. 327 $aContents; Preface; Acknowledgments; Chapter 1 Introduction; Chapter 2 Access Control: Properties, Policies, and Models; Chapter 3 Core RBAC Features; Chapter 4 Role Hierarchies; Chapter 5 SoD and Constraints in RBAC Systems; Chapter 6 RBAC, MAC, and DAC; Chapter 7 Privacy and Regulatory Issues; Chapter 8 RBAC Standards and Profiles; Chapter 9 Role-Based Administration of RBAC; Chapter 10 Role Engineering; Chapter 11 Enterprise Access Control Frameworks Using RBAC and XML Technologies; Chapter 12 Integrating RBAC with Enterprise IT Infrastructures 327 $aChapter 13 Migrating to RBAC-Case Study: Multiline Insurance CompanyChapter 14 RBAC Features in Commercial Products; Appendix A: XML Schema for the RBAC Model; Appendix B: XML-Encoded Data for RBAC Model 330 $aRole-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners the very latest details on this popular network security model. 410 0$aArtech House information security and privacy series. 606 $aComputer networks$xAccess control 606 $aComputer security 606 $aComputers$xAccess control 615 0$aComputer networks$xAccess control. 615 0$aComputer security. 615 0$aComputers$xAccess control. 676 $a005.8 700 $aFerraiolo$b David$01162179 701 $aChandramouli$b Ramaswamy$01162180 701 $aKuhn$b D. Richard$01162181 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910782015203321 996 $aRole-based access control$93712380 997 $aUNINA