Role engineering for enterprise security management

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Coyne, Edward J., PhD (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Boston Artech House 2008
Schriftenreihe:Artech House information security and privacy series
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV043163802
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151126s2008 |||| o||u| ||||||eng d
020 |a 159693218X  |9 1-59693-218-X 
020 |a 1596932198  |c electronic bk.  |9 1-59693-219-8 
020 |a 9781596932180  |9 978-1-59693-218-0 
020 |a 9781596932197  |c electronic bk.  |9 978-1-59693-219-7 
035 |a (OCoLC)247014336 
035 |a (DE-599)BVBBV043163802 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 005.8  |2 22 
100 1 |a Coyne, Edward J., PhD.  |e Verfasser  |4 aut 
245 1 0 |a Role engineering for enterprise security management  |c Edward J. Coyne, John M. Davis 
264 1 |a Boston  |b Artech House  |c 2008 
300 |a 1 Online-Ressource (xvii, 224 p.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Artech House information security and privacy series 
500 |a The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why? 
500 |a Includes bibliographical references and index 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Computer network architectures  |2 fast 
650 7 |a Computer networks / Access control  |2 fast 
650 7 |a Information resources management  |2 fast 
650 7 |a Management information systems  |2 fast 
650 4 |a Information resources management 
650 4 |a Computer networks  |x Access control 
650 4 |a Computer network architectures 
650 4 |a Management information systems 
650 0 7 |a Informationssystem  |0 (DE-588)4072806-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Unternehmen  |0 (DE-588)4061963-1  |2 gnd  |9 rswk-swf 
689 0 0 |a Unternehmen  |0 (DE-588)4061963-1  |D s 
689 0 1 |a Informationssystem  |0 (DE-588)4072806-7  |D s 
689 0 2 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 0 |8 1\p  |5 DE-604 
700 1 |a Davis, John M.  |e Sonstige  |4 oth 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225202  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
999 |a oai:aleph.bib-bvb.de:BVB01-028587993 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225202  |l FAW01  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225202  |l FAW02  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1804175636773732352
any_adam_object
author Coyne, Edward J., PhD
author_facet Coyne, Edward J., PhD
author_role aut
author_sort Coyne, Edward J., PhD
author_variant e j p c ejp ejpc
building Verbundindex
bvnumber BV043163802
collection ZDB-4-EBA
ctrlnum (OCoLC)247014336
(DE-599)BVBBV043163802
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03213nmm a2200625zc 4500</leader><controlfield tag="001">BV043163802</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159693218X</subfield><subfield code="9">1-59693-218-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596932198</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59693-219-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596932180</subfield><subfield code="9">978-1-59693-218-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596932197</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59693-219-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)247014336</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043163802</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Coyne, Edward J., PhD.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Role engineering for enterprise security management</subfield><subfield code="c">Edward J. Coyne, John M. Davis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Artech House</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 224 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer network architectures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information resources management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Management information systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Davis, John M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=225202</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028587993</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=225202</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=225202</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043163802
illustrated Not Illustrated
indexdate 2024-07-10T07:19:27Z
institution BVB
isbn 159693218X
1596932198
9781596932180
9781596932197
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028587993
oclc_num 247014336
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 Online-Ressource (xvii, 224 p.)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2008
publishDateSearch 2008
publishDateSort 2008
publisher Artech House
record_format marc
series2 Artech House information security and privacy series
spelling Coyne, Edward J., PhD. Verfasser aut
Role engineering for enterprise security management Edward J. Coyne, John M. Davis
Boston Artech House 2008
1 Online-Ressource (xvii, 224 p.)
txt rdacontent
c rdamedia
cr rdacarrier
Artech House information security and privacy series
The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
Includes bibliographical references and index
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer network architectures fast
Computer networks / Access control fast
Information resources management fast
Management information systems fast
Information resources management
Computer networks Access control
Computer network architectures
Management information systems
Informationssystem (DE-588)4072806-7 gnd rswk-swf
Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf
Unternehmen (DE-588)4061963-1 gnd rswk-swf
Unternehmen (DE-588)4061963-1 s
Informationssystem (DE-588)4072806-7 s
Zugriffskontrolle (DE-588)4293034-0 s
1\p DE-604
Davis, John M. Sonstige oth
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225202 Aggregator Volltext
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Coyne, Edward J., PhD
Role engineering for enterprise security management
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer network architectures fast
Computer networks / Access control fast
Information resources management fast
Management information systems fast
Information resources management
Computer networks Access control
Computer network architectures
Management information systems
Informationssystem (DE-588)4072806-7 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Unternehmen (DE-588)4061963-1 gnd
subject_GND (DE-588)4072806-7
(DE-588)4293034-0
(DE-588)4061963-1
title Role engineering for enterprise security management
title_auth Role engineering for enterprise security management
title_exact_search Role engineering for enterprise security management
title_full Role engineering for enterprise security management Edward J. Coyne, John M. Davis
title_fullStr Role engineering for enterprise security management Edward J. Coyne, John M. Davis
title_full_unstemmed Role engineering for enterprise security management Edward J. Coyne, John M. Davis
title_short Role engineering for enterprise security management
title_sort role engineering for enterprise security management
topic COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer network architectures fast
Computer networks / Access control fast
Information resources management fast
Management information systems fast
Information resources management
Computer networks Access control
Computer network architectures
Management information systems
Informationssystem (DE-588)4072806-7 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Unternehmen (DE-588)4061963-1 gnd
topic_facet COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Computer network architectures
Computer networks / Access control
Information resources management
Management information systems
Computer networks Access control
Informationssystem
Zugriffskontrolle
Unternehmen
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225202
work_keys_str_mv AT coyneedwardjphd roleengineeringforenterprisesecuritymanagement
AT davisjohnm roleengineeringforenterprisesecuritymanagement