Role engineering for enterprise security management

Main Author: Coyne, Edward J., PhD.
Corporate Author: ebrary, Inc.
Other Authors: Davis, John M.
Format: Book
Language:English
Published: Boston : Artech House, 2008.
Series:Artech House information security and privacy series
Subjects:
Online Access:http://site.ebrary.com/lib/ucy/Doc?id=10240780
Table of Contents:
  • The business case for role-based access control
  • Role engineering in the phases of the system development life cycle
  • Role engineering and why we need it
  • Defining good roles
  • The role engineering process
  • Designing the roles
  • Engineering the permissions
  • Tools that can be used to assist the role engineering process
  • Putting it all together : the role formation process
  • What others have been doing
  • Planning a role engineering effort
  • Staffing for role engineering
  • What can go wrong and why?