01966nam a22003614a 4500001001200000003000800012006001900020007001500039008004100054010001700095020001800112020001500130040002100145035002100166050002400187100002800211245011400239260003500353300003400388490005700422504005100479505052400530533015201054650003801206650003901244650003601283650003601319655002901355700001901384710001701403830005801420856012601478ebr10240780CaPaEBRm u cr cn|||||||||080229s2008 mauad sb 001 0 eng  z 2008270416 z9781596932180 z159693218X aCaPaEBRcCaPaEBR a(OCoLC)56050656214aT58.64b.C69 2008eb1 aCoyne, Edward J.,cPhD.10aRole engineering for enterprise security managementh[electronic resource] /cEdward J. Coyne, John M. Davis. aBoston :bArtech House,c2008. axvii, 224 p. :bill., charts.1 aArtech House information security and privacy series aIncludes bibliographical references and index.0 aThe business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why? aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2013.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries. 0aInformation resources management. 0aComputer networksxAccess control. 0aComputer network architectures. 0aManagement information systems. 7aElectronic books.2local1 aDavis, John M.2 aebrary, Inc. 0aArtech House information security and privacy series.40uhttp://site.ebrary.com/lib/rucke/Doc?id=10240780zAn electronic book accessible through the World Wide Web; click to view