000 01353 a2200253 4500
003 Nust
005 20170207154033.0
010 _a 2003041492
020 _a1580533701 (alk. paper)
040 _cNust
082 0 0 _a005.8
100 1 _aFerraiolo, David.
245 1 0 _aRole-based access control (E-BOOK)
_cDavid F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.
260 _aBoston :
_bArtech House,
_cc2003.
300 _axvii, 316 p. :
_bill. ;
_c24 cm.
440 0 _aArtech House computer security series
505 _a1 Introduction (Page-1) 2 Access Control Policy, Models, and Mechanisms—Concepts and Examples (Page-27) 3 Core RBAC Features(Page-51) 4 Role Hierarchies(Page-67) 5 So D and Constraints in RBAC Systems(Page-91) 6 RBAC, MAC, and DAC(Page-121) 7 NIST’s Proposed RBAC Standard(Page-141) 8 Role-Based Administration of RBAC(Page-155) 9 Enterprise Access Control Frameworks Using RBAC and X ML Technologies(Page-179) 10 Integrating RBAC with Enterprise IT Infrastructures(Page-211) 11 Migrating to RBAC—Case Study: Multiline Insurance Company(Page-255) 12 RBAC Features in Commercial Products(Page-265)
650 0 _aComputer networks
_xAccess control.
650 0 _aComputer security.
650 0 _aComputers
_xAccess control.
651 _aE-BOOK
700 1 _aChandramouli, Ramaswamy.
700 1 _aKuhn, D. Richard.
942 _2ddc
_cBK
999 _c192266
_d192266