<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Role-based access control (E-Book)</title>
  </titleInfo>
  <name type="personal">
    <namePart>Ferraiolo, David F.</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>Chandramouli, Ramaswamy.</namePart>
  </name>
  <name type="personal">
    <namePart>Kuhn, D. Richard.</namePart>
  </name>
  <typeOfResource/>
  <originInfo>
    <place>
      <placeTerm type="text">Boston, Mass</placeTerm>
    </place>
    <place>
      <placeTerm type="text">London</placeTerm>
    </place>
    <publisher>Artech House</publisher>
    <dateIssued>2003</dateIssued>
    <issuance/>
  </originInfo>
  <physicalDescription>
    <extent>316 s. : ill. ; 23cm.</extent>
  </physicalDescription>
  <tableOfContents>1 Introduction (Page-1) 2 Access Control Policy, Models, and Mechanisms—Concepts and Examples (Page-27) 3 Core RBAC Features(Page-51) 4 Role Hierarchies(Page-67) 5 So D and Constraints in RBAC Systems(Page-91) 6 RBAC, MAC, and DAC(Page-121) 7 NIST’s Proposed RBAC Standard(Page-141) 8 Role-Based Administration of RBAC(Page-155) 9 Enterprise Access Control Frameworks Using RBAC and X ML Technologies(Page-179) 10 Integrating RBAC with Enterprise IT Infrastructures(Page-211) 11 Migrating to RBAC—Case Study: Multiline Insurance Company(Page-255) 12 RBAC Features in Commercial Products(Page-265) </tableOfContents>
  <note type="statement of responsibility">David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli</note>
  <subject authority="lcsh">
    <topic>Computers</topic>
    <topic>Access control</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Dataskydd</topic>
  </subject>
  <subject authority="lcsh">
    <topic>S�rbarhet - datorer och databehandling</topic>
  </subject>
  <subject>
    <geographic>(E-Book)</geographic>
  </subject>
  <classification authority="ddc">005.8</classification>
  <relatedItem type="series">
    <titleInfo>
      <title>Artech House computer security series</title>
    </titleInfo>
  </relatedItem>
  <identifier type="isbn">1-58053-370-1 :</identifier>
  <recordInfo>
    <recordContentSource authority="marcorg"/>
    <recordChangeDate encoding="iso8601">20170207154032.0</recordChangeDate>
  </recordInfo>
</mods>
