| 000 | 01354 a2200253 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20170207154032.0 | ||
| 020 | _a1-58053-370-1 : | ||
| 035 | _a(Uk)1580533701 | ||
| 040 | _cNust | ||
| 082 | 0 | 4 | _a005.8 |
| 100 | 1 | _aFerraiolo, David F. | |
| 245 | 1 | 0 |
_aRole-based access control (E-Book) _cDavid F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli |
| 260 |
_aBoston, Mass. ; _aLondon : _bArtech House, _c2003 |
||
| 300 |
_a316 s. : _bill. ; _c23cm. |
||
| 440 | 0 | _aArtech House computer security series | |
| 505 | _a1 Introduction (Page-1) 2 Access Control Policy, Models, and Mechanisms—Concepts and Examples (Page-27) 3 Core RBAC Features(Page-51) 4 Role Hierarchies(Page-67) 5 So D and Constraints in RBAC Systems(Page-91) 6 RBAC, MAC, and DAC(Page-121) 7 NIST’s Proposed RBAC Standard(Page-141) 8 Role-Based Administration of RBAC(Page-155) 9 Enterprise Access Control Frameworks Using RBAC and X ML Technologies(Page-179) 10 Integrating RBAC with Enterprise IT Infrastructures(Page-211) 11 Migrating to RBAC—Case Study: Multiline Insurance Company(Page-255) 12 RBAC Features in Commercial Products(Page-265) | ||
| 650 | 0 |
_aComputers _xAccess control. |
|
| 650 | 0 | _aDataskydd | |
| 650 | 0 | _aS�rbarhet - datorer och databehandling | |
| 651 | _a(E-Book) | ||
| 700 | 1 | _aChandramouli, Ramaswamy. | |
| 700 | 1 | _aKuhn, D. Richard. | |
| 942 |
_2ddc _cBK |
||
| 999 |
_c192226 _d192226 |
||