TY - BOOK AU - Coyne,Edward J. AU - Davis,John M. ED - ebrary, Inc. TI - Role engineering for enterprise security management T2 - Artech House information security and privacy series AV - T58.64 .C69 2008eb PY - 2008/// CY - Boston PB - Artech House KW - Information resources management KW - Computer networks KW - Access control KW - Computer network architectures KW - Management information systems KW - Electronic books KW - local N1 - Includes bibliographical references and index; The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?; Electronic reproduction; Palo Alto, Calif.; ebrary; 2013; Available via World Wide Web; Access may be limited to ebrary affiliated libraries UR - http://site.ebrary.com/lib/rucke/Doc?id=10240780 ER -