Role engineering for enterprise security management
Main Author: | |
---|---|
Corporate Author: | |
Other Authors: | |
Format: | Book |
Language: | English |
Published: |
Boston :
Artech House,
2008.
|
Series: | Artech House information security and privacy series
|
Subjects: | |
Online Access: | http://site.ebrary.com/lib/ucy/Doc?id=10240780 |
Table of Contents:
- The business case for role-based access control
- Role engineering in the phases of the system development life cycle
- Role engineering and why we need it
- Defining good roles
- The role engineering process
- Designing the roles
- Engineering the permissions
- Tools that can be used to assist the role engineering process
- Putting it all together : the role formation process
- What others have been doing
- Planning a role engineering effort
- Staffing for role engineering
- What can go wrong and why?