|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBOOKCENTRAL_ocn794328384 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
120528s2012 si a ob 001 0 eng d |
010 |
|
|
|a 2011278916
|
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d YDXCP
|d N$T
|d IDEBK
|d E7B
|d I9W
|d OCLCQ
|d DEBSZ
|d CDX
|d OCLCA
|d B24X7
|d COO
|d OCLCQ
|d LGG
|d OCLCF
|d OCLCQ
|d JBG
|d AGLDB
|d MOR
|d PIFAG
|d ZCU
|d LIV
|d OCLCQ
|d MERUC
|d OCLCQ
|d U3W
|d OCLCA
|d UUM
|d STF
|d WRM
|d VTS
|d NRAMU
|d ICG
|d INT
|d VT2
|d AU@
|d OCLCQ
|d WYU
|d OCLCQ
|d DKC
|d OCLCQ
|d M8D
|d UKAHL
|d OCLCQ
|d LEAUB
|d UKCRE
|d LDP
|d VLY
|d TUHNV
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 793804761
|a 794902721
|a 817084835
|a 961685922
|a 962719324
|a 966388259
|a 988457029
|a 988461491
|a 991928127
|a 1037704741
|a 1038568802
|a 1045513777
|a 1055399282
|a 1058169128
|a 1058332480
|a 1065691047
|a 1081226612
|a 1086441894
|a 1153522002
|a 1162426400
|a 1228572261
|a 1241792540
|a 1243610328
|a 1272920684
|a 1290060652
|a 1300523039
|
020 |
|
|
|a 9789814366151
|q (electronic bk.)
|
020 |
|
|
|a 9814366153
|q (electronic bk.)
|
020 |
|
|
|a 9814374008
|
020 |
|
|
|a 9789814374002
|
020 |
|
|
|a 1280669632
|
020 |
|
|
|a 9781280669637
|
020 |
|
|
|a 9786613646569
|
020 |
|
|
|a 6613646563
|
029 |
1 |
|
|a AU@
|b 000053308528
|
029 |
1 |
|
|a DEBBG
|b BV043081529
|
029 |
1 |
|
|a DEBBG
|b BV044165374
|
029 |
1 |
|
|a DEBSZ
|b 372740030
|
029 |
1 |
|
|a DEBSZ
|b 397312016
|
029 |
1 |
|
|a DEBSZ
|b 421411856
|
029 |
1 |
|
|a DEBSZ
|b 456495088
|
029 |
1 |
|
|a NZ1
|b 15023084
|
029 |
1 |
|
|a AU@
|b 000073139184
|
035 |
|
|
|a (OCoLC)794328384
|z (OCoLC)793804761
|z (OCoLC)794902721
|z (OCoLC)817084835
|z (OCoLC)961685922
|z (OCoLC)962719324
|z (OCoLC)966388259
|z (OCoLC)988457029
|z (OCoLC)988461491
|z (OCoLC)991928127
|z (OCoLC)1037704741
|z (OCoLC)1038568802
|z (OCoLC)1045513777
|z (OCoLC)1055399282
|z (OCoLC)1058169128
|z (OCoLC)1058332480
|z (OCoLC)1065691047
|z (OCoLC)1081226612
|z (OCoLC)1086441894
|z (OCoLC)1153522002
|z (OCoLC)1162426400
|z (OCoLC)1228572261
|z (OCoLC)1241792540
|z (OCoLC)1243610328
|z (OCoLC)1272920684
|z (OCoLC)1290060652
|z (OCoLC)1300523039
|
050 |
|
4 |
|a QA76.9.D343
|
072 |
|
7 |
|a COM
|x 021030
|2 bisacsh
|
072 |
|
7 |
|a UNF
|2 bicssc
|
082 |
0 |
4 |
|a 006.312
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Colantonio, Alessandro.
|
245 |
1 |
0 |
|a Role mining in business :
|b taming role-based access control administration /
|c Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello.
|
260 |
|
|
|a Singapore :
|b World Scientific,
|c 2012.
|
300 |
|
|
|a 1 online resource (xx, 274 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
380 |
|
|
|a Bibliography
|
520 |
|
|
|a With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) -- a policy-neutral access control model that serves as a bridge between academia and industry -- is probably the most suitable security model for commercial applications. Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of a.
|
504 |
|
|
|a Includes bibliographical references (pages 259-267) and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a 1. Managing access rights. 1.1. Challenges of controlling access. 1.2. Access control concepts. 1.3. Access control models. 1.4. Final remarks -- 2. Role-based access control. 2.1. RBAC basics. 2.2. RBAC standards. 2.3. Advantages of RBAC. 2.4. Obstacles to migrating to RBAC. 2.5. Final remarks -- 3. Role engineering. 3.1. Modeling roles. 3.2. Role engineering approaches. 3.3. Parts of a role engineering task. 3.4. Guidelines. 3.5. Final remarks -- 4. A step-to-step methodology for role mining. 4.1. Role mining steps. 4.2. Understanding access control data. 4.3. Data preparation. 4.4. Role definition. 4.5. Final remarks -- 5. The hidden structure of roles. 5.1. Formalization of the role mining problem. 5.2. Graph-based approach. 5.3. Matrix-based approach. 5.4. Permission-powerset lattice. 5.5. Final remarks -- 6. Enumerating candidate roles. 6.1. Eliciting patterns from access data. 6.2. Minimizing the number of roles. 6.3. Estimating the minimum number of roles. 6.4. Final remarks -- 7. Minimizing the effort of administering RBAC. 7.1. A cost-driven approach to role engineering. 7.2. Problem formalization. 7.3. Finding optimal role-sets. 7.4. Finding sub-optimal role-sets. 7.5. Final remarks -- 8. Measuring the meaning of roles. 8.1. Meaningful roles. 8.2. Modeling business. 8.3. Measuring the meaning of roles. 8.4. Spread indices in action. 8.5. Final remarks -- 9. Visual role mining. 9.1. Role visualization problem. 9.2. Matrix sorting algorithm. 9.3. Visual elicitation of roles. 9.4. A visual approach to role engineering. 9.5. Experimental results. 9.6. Final remarks -- 10. Splitting up the mining task. 10.1. A divide-and-conquer approach. 10.2. Complexity measures. 10.3. Similarity. 10.4. Minability. 10.5. Considerations about minability and similarity. 10.6. Conditioned indices. 10.7. Application to a real case. 10.8. Final remarks -- 11. Stable roles. 11.1. Stable assignments and stable roles. 11.2. Pruning unstable assignments. 11.3. Stability and mining complexity. 11.4. Pruning examples. 11.5. Final remarks -- 12. Imputing missing grants. 12.1. Missing values. 12.2. AB[symbol]A : Adaptive Bicluster-Based Approach. 12.3. Algorithm description. 12.4. Testing AB[symbol]A. 12.5. Final remarks -- 13. The risk of meaningless roles. 13.1. Assessing risky system configurations. 13.2. Risk model. 13.3. Risk metrics. 13.4. Analysis of a real case. 13.5. Final remarks -- 14. Ranking users and permissions. 14.1. Stability. 14.2. Framework description. 14.3. Experimental results. 14.4. Final remarks.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs.
|
650 |
|
7 |
|a COMPUTERS
|x Database Management
|x Data Mining.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
700 |
1 |
|
|a Di Pietro, Roberto
|c (Computer scientist)
|1 https://id.oclc.org/worldcat/entity/E39PCjGTgMWY3vFyMdqTwFf76q
|
700 |
1 |
|
|a Ocello, Alberto.
|
758 |
|
|
|i has work:
|a Role mining in business (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCG8HjKTHVTx47HGwdfvVfq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Colantonio, Alessandro.
|t Role mining in business.
|d Singapore : World Scientific, ©2012
|z 9789814374002
|w (OCoLC)753630176
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=919089
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25565400
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00063234
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 23981246
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL919089
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10563504
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 457188
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 364656
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7280424
|
994 |
|
|
|a 92
|b IZTAP
|