header
Image from Google Jackets

Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis.

By: Contributor(s): Material type: TextSeries: Artech House information security and privacy seriesPublication details: Boston : Artech House, 2008.Description: xvii, 224 p. : ill., chartsSubject(s): Genre/Form: LOC classification:
  • T58.64 .C69 2008eb
Online resources:
Contents:
The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?

Electronic reproduction. Palo Alto, Calif. : ebrary, 2013. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.

There are no comments on this title.

to post a comment.

© 2026 Rongo University
Contact us: librarian | system librarian | Rongo university