Role mining in business : taming role-based access control administration /
With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) -- a policy-neutral access control model that serves as a bridge between acade...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Colantonio, Alessandro |
Otros Autores: | Di Pietro, Roberto (Computer scientist), Ocello, Alberto |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Singapore :
World Scientific,
2012.
|
Temas: | |
Acceso en línea: | Texto completo |
Ejemplares similares
-
Role mining in business : taming role-based access control administration /
por: Colantonio, Alessandro
Publicado: (2012) -
Role-Based Access Control.
por: Ferraiolo, David F.
Publicado: (2007) -
Cisco NAC appliance : enforcing host security with clean access /
por: Heary, Jamey
Publicado: (2007) -
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments /
por: Richter, Andy, et al.
Publicado: (2016) -
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments /
por: Richter, Andy, et al.
Publicado: (2015)