Role Engineering for Enterprise Security Management
Artech House Publishers (Verlag)
978-1-59693-218-0 (ISBN)
- Keine Verlagsinformationen verfügbar
- Artikel merken
Role engineering secures information systems. It ensures that every user has the right permission to access just the right information, computers, and networks. When hundred or thousands of computer users must be assigned their own individual access permission, role engineering saves significant time and money while protecting data and systems. This first-of-its-kind book illustrates the entire role engineering process, from project planning to deployment and verification. In addition to explaining technical aspects, the book emphasizes business benefits by showing how to manage risks and costs. Practitioners get proven techniques that define roles and ensure proper assignment of permissions and roles to users. The book also shows how to verify that roles comply with security policies.
Edward J. Coyne is a senior security engineer at Science Applications International Corporation in Vienna, Virginia. Among his many professional activities, he is a member of Health Level 7's Security and CCOW Technical committees, chair of the Role-Based Access Control Task Group of the International Committee for Information Technology Standards, and a senior member of the IEEE. John M. Davis is a security architect for the US Department of Veterans Affairs in Encintas, California. He is a voting member of the International Committee for Information Technology Standards.
The Business Case for Role-Based Access Control. Role Engineering in the Phases of the System Development Life Cycle. Role Engineering and Why We Need It. Staffing for Role Engineering. Defining Good Roles. Two Approaches to Defining Roles. Designing the Roles. Engineering Permissions. Tools that Can Be Used to Assist the Role Engineering Process. Putting It All Together. What Others Have Been Doing. What Can Go Wrong and Why. Planning a Role Engineering Effort.
Verlagsort | Norwood |
---|---|
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-59693-218-X / 159693218X |
ISBN-13 | 978-1-59693-218-0 / 9781596932180 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich