| 000 | 01353 a2200253 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20170207154033.0 | ||
| 010 | _a 2003041492 | ||
| 020 | _a1580533701 (alk. paper) | ||
| 040 | _cNust | ||
| 082 | 0 | 0 | _a005.8 |
| 100 | 1 | _aFerraiolo, David. | |
| 245 | 1 | 0 |
_aRole-based access control (E-BOOK) _cDavid F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli. |
| 260 |
_aBoston : _bArtech House, _cc2003. |
||
| 300 |
_axvii, 316 p. : _bill. ; _c24 cm. |
||
| 440 | 0 | _aArtech House computer security series | |
| 505 | _a1 Introduction (Page-1) 2 Access Control Policy, Models, and Mechanisms—Concepts and Examples (Page-27) 3 Core RBAC Features(Page-51) 4 Role Hierarchies(Page-67) 5 So D and Constraints in RBAC Systems(Page-91) 6 RBAC, MAC, and DAC(Page-121) 7 NIST’s Proposed RBAC Standard(Page-141) 8 Role-Based Administration of RBAC(Page-155) 9 Enterprise Access Control Frameworks Using RBAC and X ML Technologies(Page-179) 10 Integrating RBAC with Enterprise IT Infrastructures(Page-211) 11 Migrating to RBAC—Case Study: Multiline Insurance Company(Page-255) 12 RBAC Features in Commercial Products(Page-265) | ||
| 650 | 0 |
_aComputer networks _xAccess control. |
|
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputers _xAccess control. |
|
| 651 | _aE-BOOK | ||
| 700 | 1 | _aChandramouli, Ramaswamy. | |
| 700 | 1 | _aKuhn, D. Richard. | |
| 942 |
_2ddc _cBK |
||
| 999 |
_c192266 _d192266 |
||