000 01354 a2200253 4500
003 Nust
005 20170207154032.0
020 _a1-58053-370-1 :
035 _a(Uk)1580533701
040 _cNust
082 0 4 _a005.8
100 1 _aFerraiolo, David F.
245 1 0 _aRole-based access control (E-Book)
_cDavid F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli
260 _aBoston, Mass. ;
_aLondon :
_bArtech House,
_c2003
300 _a316 s. :
_bill. ;
_c23cm.
440 0 _aArtech House computer security series
505 _a1 Introduction (Page-1) 2 Access Control Policy, Models, and Mechanisms—Concepts and Examples (Page-27) 3 Core RBAC Features(Page-51) 4 Role Hierarchies(Page-67) 5 So D and Constraints in RBAC Systems(Page-91) 6 RBAC, MAC, and DAC(Page-121) 7 NIST’s Proposed RBAC Standard(Page-141) 8 Role-Based Administration of RBAC(Page-155) 9 Enterprise Access Control Frameworks Using RBAC and X ML Technologies(Page-179) 10 Integrating RBAC with Enterprise IT Infrastructures(Page-211) 11 Migrating to RBAC—Case Study: Multiline Insurance Company(Page-255) 12 RBAC Features in Commercial Products(Page-265)
650 0 _aComputers
_xAccess control.
650 0 _aDataskydd
650 0 _aS�rbarhet - datorer och databehandling
651 _a(E-Book)
700 1 _aChandramouli, Ramaswamy.
700 1 _aKuhn, D. Richard.
942 _2ddc
_cBK
999 _c192226
_d192226