Friday 16 April 2010

Role Mining In Business

Role Mining In Business



Role Mining In Business: Taming Role-Based Access Control Administration



With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Get and download textbook Role Mining In Business: Taming Role-Based Access Control Administration for free
Store Search search Title, ISBN and Author Role Mining in Business: Taming Role-Based Access Control Administration by Alessandro Colantonio, Roberto Di Pietro Estimated delivery 3-12 business days Format Hardcover Condition Brand New Details ISBN 9814374008 ISBN-13 9789814374002 Title Role Mining in Business: Taming Role-Based Access Control Administration Author Alessandro Colantonio, Roberto Di Pietro Format Hardcover Pages 274 Publisher World Scientific Publishing Company Dimensions 6.1 in.
Role-based Access Control (RBAC) -- a policy-neutral access control model that serves as a bridge between academia and industry -- is probably the most suitable security model for commercial applications. Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of access permissions, only a well-defined role engineering process allows for significant savings of time and money while protecting data and systems. A Role Mining In Business new edition

Download free books for Role Mining in Business: Taming Role-Based Access Control


Role Mining in Business: Taming Role-Based Access Control Administration

Role Mining in Business

World Scientific Publishing Co Pte Ltd | 2012 | 296 pages | ISBN-13: 9789814374002 | ISBN-10: 9814374008 | You save 15%

With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) ? a policy-neutral access control model that serves as a bridge between academia and industry ? is probably the most suitable security model for commercial applications.Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of ac



Role Mining In Business Textbook



A

download
No comments :
Post a Comment