Role-based access control:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston, Mass. [u.a.]
Artech House
2007
|
Ausgabe: | 2. ed. |
Schriftenreihe: | Artech House information security and privacy series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | XIX, 381 S. graph. Darst. |
ISBN: | 1596931132 9781596931138 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021791285 | ||
003 | DE-604 | ||
005 | 20100127 | ||
007 | t | ||
008 | 061102s2007 d||| |||| 00||| eng d | ||
020 | |a 1596931132 |9 1-59693-113-2 | ||
020 | |a 9781596931138 |9 978-1-59693-113-8 | ||
035 | |a (OCoLC)85851304 | ||
035 | |a (DE-599)BVBBV021791285 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-861 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Ferraiolo, David F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Role-based access control |c David F. Ferraiolo ; D. Richard Kuhn ; Ramaswamy Chandramouli |
250 | |a 2. ed. | ||
264 | 1 | |a Boston, Mass. [u.a.] |b Artech House |c 2007 | |
300 | |a XIX, 381 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Artech House information security and privacy series | |
650 | 4 | |a Computer networks |x Access control | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers |x Access control | |
650 | 0 | 7 | |a Rollenbasierte Zugriffskontrolle |0 (DE-588)4684242-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Rollenbasierte Zugriffskontrolle |0 (DE-588)4684242-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Rollenbasierte Zugriffskontrolle |0 (DE-588)4684242-1 |D s |
689 | 1 | |C b |5 DE-604 | |
700 | 1 | |a Kuhn, D. Richard |e Verfasser |4 aut | |
700 | 1 | |a Chandramouli, Ramaswamy |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015003926&sequence=000005&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015003926&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-015003926 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804135702309371905 |
---|---|
adam_text | Contents
Preface
Acknowledgments
1
1.1
1.1.1
1.1.2
1.1.3
1.2
1.2.1
1.2.2
1.2.3
1.2.4
1.3
1.4
1.4.1
1.4.2
References
2
and Models
2.1
2.2
Vlil
Contents
2.2.1
2.2.2
2.3
2.3.1
2.3.2
2.3.3
2.3.4
2.4
2.5
2.5.7
2.5.2
2.6
2.7
2.7.1
2.8
2.9
2.10
2.11
2.12
References
3
3.1
3.2
1.2.1
3.2.2
3.2.3
3.3
3.3.1
3.3.2
4
4.1
4.2
4.2.1
4.2.2
Contents
4.2.3 User Containment and
4.3
4.3.1
4.3.2
4.3.3
4.4
4.5
4.6
References
5
5.1
5.1.1
5.1.2
5.1.3
5.1.4
5.2
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6
5.3
5.3.1
5.3.2
5.3.3
References
6
6.1
6.1.1
6.1.2
6.1.3
6.2
6.2.1
Contents
622
6.3
6.3.1
63.2
6.3.3
6.3.4
6.4
References
7
7.1
7.1.1
7.1.2
7.1.3
7.1.4
7.13
7.1.6
7.2
7.2.1
relationship instances
7.2.2
7.2.3
relationship instances
7.3
7.4
7.4.1
7.4.2
7.4.3
7.4.4
References
8
8.1
8.1.1
8.12
8.1.3
8.1.4
Contents
8.1.5
8.1.6
8.1.7
8.1.8
8.1.9
8.2
References
9
9.1
9.2
9.3
9.3.1
9.3.2
9.3.3
9.4
9.4.1
9.4.2
9.4.3
9.4.4
9.4.5
References
10
10.1
101
10.1.2
10.2
10.3
10.3.1 Sage DNA 226
10.3.2
10.3.3
10.3.4
10.4
10.5
10.5.1
xii
10.5.2
10.5.3
¡0.5.4
10.5.5
References
11
Using RBAC and XML Technologies
11.1
11.2
11.2.1
11.2.2
11.3
11.4
11.4.1
11.4.2
11.5
11.6
11.7
constraint representation
11.8
enterprisewide access control implementation
11.9
References
12
Infrastructures
12.1
12.1.1
12.1.2
12.1.3
12.1.4
12.1.5
12.2
12.2.1
Contents
12.2.2
12.23
12.3
12.3.1
12.3.2
12.4
12.4.1
12.4.2
12.4.3
12.5
125.1
125.2
12.6
12.7
References
13
Multiline Insurance Company
13.1
13.2
13.2.1
¡3.2.2
13.3
13.3.1
13.Ì.2
13.4
13.4.1
13.4.2
¡3.4.3
13.5
Reference
14
14.1
14.1.1
¡4.1.2
xiv Contents
14.1.3 Sybase
14.2 RBAC in
14.2.1
14.2.2
14.2.3
¡4.2.4 Tivoli
14.3
References
Appendix A: XML Schema for the RBAC Model
Appendix B: XML-Encoded Data for
RBAC Model
About the Authors
Index
This revised edition of the Artech House bestseller, Role-Based Access Control, offers the very latest
details on this sophisticated security model aimed at reducing the cost and complexity of security
administration for large networked applications. This unique resource covers all facets of RBAC, from its
solid model-theoretic foundations to its implementation within commercial products.
Material new to the second edition includes:
More comprehensive and updated coverage of access control models;
New RBAC standards;
Additional in-depth case studies;
Discussions on role engineering and the design of role-based systems.
Practical RBAC guidance enables professionals to:
Simplify security administration;
Manage the review and control of organizational privileges;
Specify many types of enterprise security policies;
Use RBAC to emulate other access control models;
Find frameworks and tools for administering RBAC.
David
Institute of Standards and Technology (NIST), Gaithersburg, Maryland. In addition to managing three
access control and security management projects, he is leading research to improve operational assur¬
ance, security authentication, intrusion detection, and authorization.
D.
cal interests are information security and software testing and assurance. He developed, in conjunction
with David
the industry consensus standard for RBAC.
Ramaswamy
more than
ment and coauthored the first international security protection profile for RBAC. His current work focuses
on automated security testing tools, and he is the coauthor of NIST s proposed RBAC standard.
|
adam_txt |
Contents
Preface
Acknowledgments
1
1.1
1.1.1
1.1.2
1.1.3
1.2
1.2.1
1.2.2
1.2.3
1.2.4
1.3
1.4
1.4.1
1.4.2
References
2
and Models
2.1
2.2
Vlil
Contents
2.2.1
2.2.2
2.3
2.3.1
2.3.2
2.3.3
2.3.4
2.4
2.5
2.5.7
2.5.2
2.6
2.7
2.7.1
2.8
2.9
2.10
2.11
2.12
References
3
3.1
3.2
1.2.1
3.2.2
3.2.3
3.3
3.3.1
3.3.2
4
4.1
4.2
4.2.1
4.2.2
Contents
4.2.3 User Containment and
4.3
4.3.1
4.3.2
4.3.3
4.4
4.5
4.6
References
5
5.1
5.1.1
5.1.2
5.1.3
5.1.4
5.2
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6
5.3
5.3.1
5.3.2
5.3.3
References
6
6.1
6.1.1
6.1.2
6.1.3
6.2
6.2.1
Contents
622
6.3
6.3.1
63.2
6.3.3
6.3.4
6.4
References
7
7.1
7.1.1
7.1.2
7.1.3
7.1.4
7.13
7.1.6
7.2
7.2.1
relationship instances
7.2.2
7.2.3
relationship instances
7.3
7.4
7.4.1
7.4.2
7.4.3
7.4.4
References
8
8.1
8.1.1
8.12
8.1.3
8.1.4
Contents
8.1.5
8.1.6
8.1.7
8.1.8
8.1.9
8.2
References
9
9.1
9.2
9.3
9.3.1
9.3.2
9.3.3
9.4
9.4.1
9.4.2
9.4.3
9.4.4
9.4.5
References
10
10.1
101
10.1.2
10.2
10.3
10.3.1 Sage DNA 226
10.3.2
10.3.3
10.3.4
10.4
10.5
10.5.1
xii
10.5.2
10.5.3
¡0.5.4
10.5.5
References
11
Using RBAC and XML Technologies
11.1
11.2
11.2.1
11.2.2
11.3
11.4
11.4.1
11.4.2
11.5
11.6
11.7
constraint representation
11.8
enterprisewide access control implementation
11.9
References
12
Infrastructures
12.1
12.1.1
12.1.2
12.1.3
12.1.4
12.1.5
12.2
12.2.1
Contents
12.2.2
12.23
12.3
12.3.1
12.3.2
12.4
12.4.1
12.4.2
12.4.3
12.5
125.1
125.2
12.6
12.7
References
13
Multiline Insurance Company
13.1
13.2
13.2.1
¡3.2.2
13.3
13.3.1
13.Ì.2
13.4
13.4.1
13.4.2
¡3.4.3
13.5
Reference
14
14.1
14.1.1
¡4.1.2
xiv Contents
14.1.3 Sybase
14.2 RBAC in
14.2.1
14.2.2
14.2.3
¡4.2.4 Tivoli
14.3
References
Appendix A: XML Schema for the RBAC Model
Appendix B: XML-Encoded Data for
RBAC Model
About the Authors
Index
This revised edition of the Artech House bestseller, Role-Based Access Control, offers the very latest
details on this sophisticated security model aimed at reducing the cost and complexity of security
administration for large networked applications. This unique resource covers all facets of RBAC, from its
solid model-theoretic foundations to its implementation within commercial products.
Material new to the second edition includes:
More comprehensive and updated coverage of access control models;
New RBAC standards;
Additional in-depth case studies;
Discussions on role engineering and the design of role-based systems.
Practical RBAC guidance enables professionals to:
Simplify security administration;
Manage the review and control of organizational privileges;
Specify many types of enterprise security policies;
Use RBAC to emulate other access control models;
Find frameworks and tools for administering RBAC.
David
Institute of Standards and Technology (NIST), Gaithersburg, Maryland. In addition to managing three
access control and security management projects, he is leading research to improve operational assur¬
ance, security authentication, intrusion detection, and authorization.
D.
cal interests are information security and software testing and assurance. He developed, in conjunction
with David
the industry consensus standard for RBAC.
Ramaswamy
more than
ment and coauthored the first international security protection profile for RBAC. His current work focuses
on automated security testing tools, and he is the coauthor of NIST's proposed RBAC standard. |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Ferraiolo, David F. Kuhn, D. Richard Chandramouli, Ramaswamy |
author_facet | Ferraiolo, David F. Kuhn, D. Richard Chandramouli, Ramaswamy |
author_role | aut aut aut |
author_sort | Ferraiolo, David F. |
author_variant | d f f df dff d r k dr drk r c rc |
building | Verbundindex |
bvnumber | BV021791285 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)85851304 (DE-599)BVBBV021791285 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02231nam a2200505 c 4500</leader><controlfield tag="001">BV021791285</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100127 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">061102s2007 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596931132</subfield><subfield code="9">1-59693-113-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596931138</subfield><subfield code="9">978-1-59693-113-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)85851304</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021791285</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-861</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferraiolo, David F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Role-based access control</subfield><subfield code="c">David F. Ferraiolo ; D. Richard Kuhn ; Ramaswamy Chandramouli</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, Mass. [u.a.]</subfield><subfield code="b">Artech House</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 381 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rollenbasierte Zugriffskontrolle</subfield><subfield code="0">(DE-588)4684242-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rollenbasierte Zugriffskontrolle</subfield><subfield code="0">(DE-588)4684242-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rollenbasierte Zugriffskontrolle</subfield><subfield code="0">(DE-588)4684242-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kuhn, D. Richard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chandramouli, Ramaswamy</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015003926&sequence=000005&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015003926&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015003926</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV021791285 |
illustrated | Illustrated |
index_date | 2024-07-02T15:44:38Z |
indexdate | 2024-07-09T20:44:42Z |
institution | BVB |
isbn | 1596931132 9781596931138 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015003926 |
oclc_num | 85851304 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-861 |
owner_facet | DE-355 DE-BY-UBR DE-861 |
physical | XIX, 381 S. graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Artech House |
record_format | marc |
series2 | Artech House information security and privacy series |
spelling | Ferraiolo, David F. Verfasser aut Role-based access control David F. Ferraiolo ; D. Richard Kuhn ; Ramaswamy Chandramouli 2. ed. Boston, Mass. [u.a.] Artech House 2007 XIX, 381 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Artech House information security and privacy series Computer networks Access control Computer security Computers Access control Rollenbasierte Zugriffskontrolle (DE-588)4684242-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Rollenbasierte Zugriffskontrolle (DE-588)4684242-1 s 1\p DE-604 b DE-604 Kuhn, D. Richard Verfasser aut Chandramouli, Ramaswamy Verfasser aut Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015003926&sequence=000005&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015003926&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Ferraiolo, David F. Kuhn, D. Richard Chandramouli, Ramaswamy Role-based access control Computer networks Access control Computer security Computers Access control Rollenbasierte Zugriffskontrolle (DE-588)4684242-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4684242-1 (DE-588)4274324-2 |
title | Role-based access control |
title_auth | Role-based access control |
title_exact_search | Role-based access control |
title_exact_search_txtP | Role-based access control |
title_full | Role-based access control David F. Ferraiolo ; D. Richard Kuhn ; Ramaswamy Chandramouli |
title_fullStr | Role-based access control David F. Ferraiolo ; D. Richard Kuhn ; Ramaswamy Chandramouli |
title_full_unstemmed | Role-based access control David F. Ferraiolo ; D. Richard Kuhn ; Ramaswamy Chandramouli |
title_short | Role-based access control |
title_sort | role based access control |
topic | Computer networks Access control Computer security Computers Access control Rollenbasierte Zugriffskontrolle (DE-588)4684242-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer networks Access control Computer security Computers Access control Rollenbasierte Zugriffskontrolle Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015003926&sequence=000005&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015003926&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ferraiolodavidf rolebasedaccesscontrol AT kuhndrichard rolebasedaccesscontrol AT chandramouliramaswamy rolebasedaccesscontrol |