01329 a2200241 4500003000500000005001700005020002000022035001900042040000900061082001000070100002400080245010000104260005100204300002800255440004200283505060800325650003100933650001400964650004500978651001301023700002901036700002201065Nust20170207154032.0 a1-58053-370-1 : a(Uk)1580533701 cNust04a005.81 aFerraiolo, David F.10aRole-based access control (E-Book)cDavid F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli aBoston, Mass. ;aLondon :bArtech House,c2003 a316 s. :bill. ;c23cm. 0aArtech House computer security series a1 Introduction (Page-1) 2 Access Control Policy, Models, and Mechanisms—Concepts and Examples (Page-27) 3 Core RBAC Features(Page-51) 4 Role Hierarchies(Page-67) 5 So D and Constraints in RBAC Systems(Page-91) 6 RBAC, MAC, and DAC(Page-121) 7 NIST’s Proposed RBAC Standard(Page-141) 8 Role-Based Administration of RBAC(Page-155) 9 Enterprise Access Control Frameworks Using RBAC and X ML Technologies(Page-179) 10 Integrating RBAC with Enterprise IT Infrastructures(Page-211) 11 Migrating to RBAC—Case Study: Multiline Insurance Company(Page-255) 12 RBAC Features in Commercial Products(Page-265)  0aComputersxAccess control. 0aDataskydd 0aS�rbarhet - datorer och databehandling a(E-Book)1 aChandramouli, Ramaswamy.1 aKuhn, D. Richard.