Cargando…

Role mining in business : taming role-based access control administration /

With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) -- a policy-neutral access control model that serves as a bridge between acade...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Colantonio, Alessandro
Otros Autores: Di Pietro, Roberto (Computer scientist), Ocello, Alberto
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Singapore : World Scientific, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn794328384
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 120528s2012 si a ob 001 0 eng d
010 |a  2011278916 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d YDXCP  |d N$T  |d IDEBK  |d E7B  |d I9W  |d OCLCQ  |d DEBSZ  |d CDX  |d OCLCA  |d B24X7  |d COO  |d OCLCQ  |d LGG  |d OCLCF  |d OCLCQ  |d JBG  |d AGLDB  |d MOR  |d PIFAG  |d ZCU  |d LIV  |d OCLCQ  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d UUM  |d STF  |d WRM  |d VTS  |d NRAMU  |d ICG  |d INT  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d OCLCQ  |d DKC  |d OCLCQ  |d M8D  |d UKAHL  |d OCLCQ  |d LEAUB  |d UKCRE  |d LDP  |d VLY  |d TUHNV  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 793804761  |a 794902721  |a 817084835  |a 961685922  |a 962719324  |a 966388259  |a 988457029  |a 988461491  |a 991928127  |a 1037704741  |a 1038568802  |a 1045513777  |a 1055399282  |a 1058169128  |a 1058332480  |a 1065691047  |a 1081226612  |a 1086441894  |a 1153522002  |a 1162426400  |a 1228572261  |a 1241792540  |a 1243610328  |a 1272920684  |a 1290060652  |a 1300523039 
020 |a 9789814366151  |q (electronic bk.) 
020 |a 9814366153  |q (electronic bk.) 
020 |a 9814374008 
020 |a 9789814374002 
020 |a 1280669632 
020 |a 9781280669637 
020 |a 9786613646569 
020 |a 6613646563 
029 1 |a AU@  |b 000053308528 
029 1 |a DEBBG  |b BV043081529 
029 1 |a DEBBG  |b BV044165374 
029 1 |a DEBSZ  |b 372740030 
029 1 |a DEBSZ  |b 397312016 
029 1 |a DEBSZ  |b 421411856 
029 1 |a DEBSZ  |b 456495088 
029 1 |a NZ1  |b 15023084 
029 1 |a AU@  |b 000073139184 
035 |a (OCoLC)794328384  |z (OCoLC)793804761  |z (OCoLC)794902721  |z (OCoLC)817084835  |z (OCoLC)961685922  |z (OCoLC)962719324  |z (OCoLC)966388259  |z (OCoLC)988457029  |z (OCoLC)988461491  |z (OCoLC)991928127  |z (OCoLC)1037704741  |z (OCoLC)1038568802  |z (OCoLC)1045513777  |z (OCoLC)1055399282  |z (OCoLC)1058169128  |z (OCoLC)1058332480  |z (OCoLC)1065691047  |z (OCoLC)1081226612  |z (OCoLC)1086441894  |z (OCoLC)1153522002  |z (OCoLC)1162426400  |z (OCoLC)1228572261  |z (OCoLC)1241792540  |z (OCoLC)1243610328  |z (OCoLC)1272920684  |z (OCoLC)1290060652  |z (OCoLC)1300523039 
050 4 |a QA76.9.D343 
072 7 |a COM  |x 021030  |2 bisacsh 
072 7 |a UNF  |2 bicssc 
082 0 4 |a 006.312 
049 |a UAMI 
100 1 |a Colantonio, Alessandro. 
245 1 0 |a Role mining in business :  |b taming role-based access control administration /  |c Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello. 
260 |a Singapore :  |b World Scientific,  |c 2012. 
300 |a 1 online resource (xx, 274 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
380 |a Bibliography 
520 |a With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) -- a policy-neutral access control model that serves as a bridge between academia and industry -- is probably the most suitable security model for commercial applications. Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of a. 
504 |a Includes bibliographical references (pages 259-267) and index. 
588 0 |a Print version record. 
505 0 |a 1. Managing access rights. 1.1. Challenges of controlling access. 1.2. Access control concepts. 1.3. Access control models. 1.4. Final remarks -- 2. Role-based access control. 2.1. RBAC basics. 2.2. RBAC standards. 2.3. Advantages of RBAC. 2.4. Obstacles to migrating to RBAC. 2.5. Final remarks -- 3. Role engineering. 3.1. Modeling roles. 3.2. Role engineering approaches. 3.3. Parts of a role engineering task. 3.4. Guidelines. 3.5. Final remarks -- 4. A step-to-step methodology for role mining. 4.1. Role mining steps. 4.2. Understanding access control data. 4.3. Data preparation. 4.4. Role definition. 4.5. Final remarks -- 5. The hidden structure of roles. 5.1. Formalization of the role mining problem. 5.2. Graph-based approach. 5.3. Matrix-based approach. 5.4. Permission-powerset lattice. 5.5. Final remarks -- 6. Enumerating candidate roles. 6.1. Eliciting patterns from access data. 6.2. Minimizing the number of roles. 6.3. Estimating the minimum number of roles. 6.4. Final remarks -- 7. Minimizing the effort of administering RBAC. 7.1. A cost-driven approach to role engineering. 7.2. Problem formalization. 7.3. Finding optimal role-sets. 7.4. Finding sub-optimal role-sets. 7.5. Final remarks -- 8. Measuring the meaning of roles. 8.1. Meaningful roles. 8.2. Modeling business. 8.3. Measuring the meaning of roles. 8.4. Spread indices in action. 8.5. Final remarks -- 9. Visual role mining. 9.1. Role visualization problem. 9.2. Matrix sorting algorithm. 9.3. Visual elicitation of roles. 9.4. A visual approach to role engineering. 9.5. Experimental results. 9.6. Final remarks -- 10. Splitting up the mining task. 10.1. A divide-and-conquer approach. 10.2. Complexity measures. 10.3. Similarity. 10.4. Minability. 10.5. Considerations about minability and similarity. 10.6. Conditioned indices. 10.7. Application to a real case. 10.8. Final remarks -- 11. Stable roles. 11.1. Stable assignments and stable roles. 11.2. Pruning unstable assignments. 11.3. Stability and mining complexity. 11.4. Pruning examples. 11.5. Final remarks -- 12. Imputing missing grants. 12.1. Missing values. 12.2. AB[symbol]A : Adaptive Bicluster-Based Approach. 12.3. Algorithm description. 12.4. Testing AB[symbol]A. 12.5. Final remarks -- 13. The risk of meaningless roles. 13.1. Assessing risky system configurations. 13.2. Risk model. 13.3. Risk metrics. 13.4. Analysis of a real case. 13.5. Final remarks -- 14. Ranking users and permissions. 14.1. Stability. 14.2. Framework description. 14.3. Experimental results. 14.4. Final remarks. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computers  |x Access control. 
650 0 |a Computer security. 
650 0 |a Computer networks. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs. 
650 7 |a COMPUTERS  |x Database Management  |x Data Mining.  |2 bisacsh 
650 7 |a Computer networks  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
700 1 |a Di Pietro, Roberto  |c (Computer scientist)  |1 https://id.oclc.org/worldcat/entity/E39PCjGTgMWY3vFyMdqTwFf76q 
700 1 |a Ocello, Alberto. 
758 |i has work:  |a Role mining in business (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCG8HjKTHVTx47HGwdfvVfq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Colantonio, Alessandro.  |t Role mining in business.  |d Singapore : World Scientific, ©2012  |z 9789814374002  |w (OCoLC)753630176 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=919089  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25565400 
938 |a Books 24x7  |b B247  |n bks00063234 
938 |a Coutts Information Services  |b COUT  |n 23981246 
938 |a EBL - Ebook Library  |b EBLB  |n EBL919089 
938 |a ebrary  |b EBRY  |n ebr10563504 
938 |a EBSCOhost  |b EBSC  |n 457188 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 364656 
938 |a YBP Library Services  |b YANK  |n 7280424 
994 |a 92  |b IZTAP