Role mining in business : taming role-based access control administration /
With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) -- a policy-neutral access control model that serves as a bridge between acade...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Colantonio, Alessandro |
Otros Autores: | Di Pietro, Roberto (Computer scientist), Ocello, Alberto |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Singapore :
World Scientific,
2012.
|
Temas: | |
Acceso en línea: | Texto completo |
Ejemplares similares
-
Role-based access control /
por: Ferraiolo, David
Publicado: (2003) -
Role mining in business : taming role-based access control administration /
por: Colantonio, Alessandro
Publicado: (2012) -
Role-based access control /
por: Ferraiolo, David
Publicado: (2007) -
Understanding intrusion detection systems : detecting attackers and incidents inside your hosts and networks /
Publicado: (2016) -
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 /
por: Williams, Barry L.
Publicado: (2016)