Role-based access control /:
Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these c...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston :
Artech House,
©2003.
|
Schriftenreihe: | Artech House computer security series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer RBAC in a networked environment and how to integrate it with existing infrastructure. |
Beschreibung: | 1 online resource (xvii, 316 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1580533248 9781580533249 1580533701 9781580533706 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm52751639 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 030730s2003 maua ob 001 0 eng | ||
040 | |a N$T |b eng |e pn |c N$T |d UMC |d YDXCP |d OCLCQ |d TUU |d OCLCQ |d B24X7 |d TNF |d OCLCQ |d OCLCF |d OCLCO |d NLGGC |d OCLCO |d MERUC |d CCO |d E7B |d NTG |d WPG |d REDDC |d BAKER |d DKDLA |d EBLCP |d DEBSZ |d FVL |d OCLCQ |d OCLCO |d N$T |d OCLCQ |d AZK |d LOA |d JBG |d CNNOR |d OCLCQ |d MOR |d PIFBR |d ZCU |d LIV |d OCLCQ |d WY@ |d U3W |d OCLCA |d LUE |d STF |d BRL |d WRM |d NRAMU |d ICG |d INT |d VT2 |d TOF |d OCLCQ |d AU@ |d COO |d WYU |d A6Q |d OCLCQ |d DKC |d OCLCQ |d M8D |d UKAHL |d OCLCQ |d UKCRE |d BRF |d UKEHC |d HS0 |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 63284383 |a 70739027 |a 475184614 |a 475473789 |a 559833863 |a 646733032 |a 722361997 |a 728032286 |a 888493402 |a 961607716 |a 961653446 |a 962689800 |a 962689839 |a 966257449 |a 988434709 |a 991904373 |a 992051146 |a 993128867 |a 1037514316 |a 1037788055 |a 1038585073 |a 1045504043 |a 1053033505 |a 1055397887 |a 1058119249 |a 1058176268 |a 1064149444 |a 1076305677 |a 1081290761 |a 1148108971 |a 1152985726 |a 1200053617 |a 1228591072 | ||
020 | |a 1580533248 |q (electronic bk.) | ||
020 | |a 9781580533249 |q (electronic bk.) | ||
020 | |a 1580533701 | ||
020 | |a 9781580533706 | ||
020 | |z 9781580533706 |q (alk. paper) | ||
020 | |z 1580533701 |q (alk. paper) | ||
024 | 3 | |a 9781580533706 | |
035 | |a (OCoLC)52751639 |z (OCoLC)63284383 |z (OCoLC)70739027 |z (OCoLC)475184614 |z (OCoLC)475473789 |z (OCoLC)559833863 |z (OCoLC)646733032 |z (OCoLC)722361997 |z (OCoLC)728032286 |z (OCoLC)888493402 |z (OCoLC)961607716 |z (OCoLC)961653446 |z (OCoLC)962689800 |z (OCoLC)962689839 |z (OCoLC)966257449 |z (OCoLC)988434709 |z (OCoLC)991904373 |z (OCoLC)992051146 |z (OCoLC)993128867 |z (OCoLC)1037514316 |z (OCoLC)1037788055 |z (OCoLC)1038585073 |z (OCoLC)1045504043 |z (OCoLC)1053033505 |z (OCoLC)1055397887 |z (OCoLC)1058119249 |z (OCoLC)1058176268 |z (OCoLC)1064149444 |z (OCoLC)1076305677 |z (OCoLC)1081290761 |z (OCoLC)1148108971 |z (OCoLC)1152985726 |z (OCoLC)1200053617 |z (OCoLC)1228591072 | ||
037 | |b 00002345 | ||
050 | 4 | |a QA76.9.A25 |b F47 2003eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Ferraiolo, David. | |
245 | 1 | 0 | |a Role-based access control / |c David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli. |
260 | |a Boston : |b Artech House, |c ©2003. | ||
300 | |a 1 online resource (xvii, 316 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Artech House computer security series | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
520 | 3 | |a Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer RBAC in a networked environment and how to integrate it with existing infrastructure. |c Publisher abstract. | |
505 | 0 | |a Role-Based Access Control; Contents vii; Preface xv; Acknowledgements xvii; Chapter 1 Introduction 1; Chapter 2 Access Control Policy, Models, and Mechanisms -- Concepts and Examples 27; Chapter 3 Core RBAC Features 51; Chapter 4 Role Hierachies 67; Chapter 5 SoD and Constraints in RBAC Systems 91; Chapter 6 RBAC, MAC, and DAC 121; Chapter 7 NIST's Proposed RBAC Standard 141; Chapter 8 Role-Based Administration of RBAC 155; Chapter 9 Enterprise Access Control Framework Using RBAC and XML Technologies 179; Chapter 10 Integrating RBAC with Enterprise IT Infrastructures 211 | |
505 | 8 | |a Chapter 11 Migrating to RBAC -- Case Study: Multiline Insurance Company 255Chapter 12 RBAC Features in Commercial Products 265; References 293; Appendix A 295; Appendix B 299; About the authors 303; Index 305 | |
650 | 0 | |a Computers |x Access control. |0 http://id.loc.gov/authorities/subjects/sh85029553 | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Access control. |0 http://id.loc.gov/authorities/subjects/sh2007008424 | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Access control |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers |x Access control |2 fast | |
700 | 1 | |a Kuhn, D. Richard. | |
700 | 1 | |a Chandramouli, Ramaswamy. | |
776 | 0 | 8 | |i Print version: |a Ferraiolo, David. |t Role-based access control. |d Boston : Artech House, ©2003 |z 1580533701 |w (DLC) 2003041492 |w (OCoLC)51518423 |
830 | 0 | |a Artech House computer security series. |0 http://id.loc.gov/authorities/names/no00015115 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=87740 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH20049959 | ||
938 | |a Books 24x7 |b B247 |n bks00004018 | ||
938 | |a Baker & Taylor |b BKTY |c 85.00 |d 85.00 |i 1580533701 |n 0004134192 |s active | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL227631 | ||
938 | |a EBSCOhost |b EBSC |n 87740 | ||
938 | |a IEEE |b IEEE |n 9106075 | ||
938 | |a YBP Library Services |b YANK |n 2358582 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm52751639 |
---|---|
_version_ | 1816881609310208000 |
adam_text | |
any_adam_object | |
author | Ferraiolo, David |
author2 | Kuhn, D. Richard Chandramouli, Ramaswamy |
author2_role | |
author2_variant | d r k dr drk r c rc |
author_facet | Ferraiolo, David Kuhn, D. Richard Chandramouli, Ramaswamy |
author_role | |
author_sort | Ferraiolo, David |
author_variant | d f df |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 F47 2003eb |
callnumber-search | QA76.9.A25 F47 2003eb |
callnumber-sort | QA 276.9 A25 F47 42003EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Role-Based Access Control; Contents vii; Preface xv; Acknowledgements xvii; Chapter 1 Introduction 1; Chapter 2 Access Control Policy, Models, and Mechanisms -- Concepts and Examples 27; Chapter 3 Core RBAC Features 51; Chapter 4 Role Hierachies 67; Chapter 5 SoD and Constraints in RBAC Systems 91; Chapter 6 RBAC, MAC, and DAC 121; Chapter 7 NIST's Proposed RBAC Standard 141; Chapter 8 Role-Based Administration of RBAC 155; Chapter 9 Enterprise Access Control Framework Using RBAC and XML Technologies 179; Chapter 10 Integrating RBAC with Enterprise IT Infrastructures 211 Chapter 11 Migrating to RBAC -- Case Study: Multiline Insurance Company 255Chapter 12 RBAC Features in Commercial Products 265; References 293; Appendix A 295; Appendix B 299; About the authors 303; Index 305 |
ctrlnum | (OCoLC)52751639 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05505cam a2200757 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm52751639 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">030730s2003 maua ob 001 0 eng </controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">UMC</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">TNF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">NTG</subfield><subfield code="d">WPG</subfield><subfield code="d">REDDC</subfield><subfield code="d">BAKER</subfield><subfield code="d">DKDLA</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">CNNOR</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">ZCU</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">TOF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">COO</subfield><subfield code="d">WYU</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BRF</subfield><subfield code="d">UKEHC</subfield><subfield code="d">HS0</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">63284383</subfield><subfield code="a">70739027</subfield><subfield code="a">475184614</subfield><subfield code="a">475473789</subfield><subfield code="a">559833863</subfield><subfield code="a">646733032</subfield><subfield code="a">722361997</subfield><subfield code="a">728032286</subfield><subfield code="a">888493402</subfield><subfield code="a">961607716</subfield><subfield code="a">961653446</subfield><subfield code="a">962689800</subfield><subfield code="a">962689839</subfield><subfield code="a">966257449</subfield><subfield code="a">988434709</subfield><subfield code="a">991904373</subfield><subfield code="a">992051146</subfield><subfield code="a">993128867</subfield><subfield code="a">1037514316</subfield><subfield code="a">1037788055</subfield><subfield code="a">1038585073</subfield><subfield code="a">1045504043</subfield><subfield code="a">1053033505</subfield><subfield code="a">1055397887</subfield><subfield code="a">1058119249</subfield><subfield code="a">1058176268</subfield><subfield code="a">1064149444</subfield><subfield code="a">1076305677</subfield><subfield code="a">1081290761</subfield><subfield code="a">1148108971</subfield><subfield code="a">1152985726</subfield><subfield code="a">1200053617</subfield><subfield code="a">1228591072</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580533248</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580533249</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580533701</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580533706</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781580533706</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1580533701</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781580533706</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52751639</subfield><subfield code="z">(OCoLC)63284383</subfield><subfield code="z">(OCoLC)70739027</subfield><subfield code="z">(OCoLC)475184614</subfield><subfield code="z">(OCoLC)475473789</subfield><subfield code="z">(OCoLC)559833863</subfield><subfield code="z">(OCoLC)646733032</subfield><subfield code="z">(OCoLC)722361997</subfield><subfield code="z">(OCoLC)728032286</subfield><subfield code="z">(OCoLC)888493402</subfield><subfield code="z">(OCoLC)961607716</subfield><subfield code="z">(OCoLC)961653446</subfield><subfield code="z">(OCoLC)962689800</subfield><subfield code="z">(OCoLC)962689839</subfield><subfield code="z">(OCoLC)966257449</subfield><subfield code="z">(OCoLC)988434709</subfield><subfield code="z">(OCoLC)991904373</subfield><subfield code="z">(OCoLC)992051146</subfield><subfield code="z">(OCoLC)993128867</subfield><subfield code="z">(OCoLC)1037514316</subfield><subfield code="z">(OCoLC)1037788055</subfield><subfield code="z">(OCoLC)1038585073</subfield><subfield code="z">(OCoLC)1045504043</subfield><subfield code="z">(OCoLC)1053033505</subfield><subfield code="z">(OCoLC)1055397887</subfield><subfield code="z">(OCoLC)1058119249</subfield><subfield code="z">(OCoLC)1058176268</subfield><subfield code="z">(OCoLC)1064149444</subfield><subfield code="z">(OCoLC)1076305677</subfield><subfield code="z">(OCoLC)1081290761</subfield><subfield code="z">(OCoLC)1148108971</subfield><subfield code="z">(OCoLC)1152985726</subfield><subfield code="z">(OCoLC)1200053617</subfield><subfield code="z">(OCoLC)1228591072</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="b">00002345</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">F47 2003eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferraiolo, David.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Role-based access control /</subfield><subfield code="c">David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boston :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">©2003.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 316 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House computer security series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer RBAC in a networked environment and how to integrate it with existing infrastructure.</subfield><subfield code="c">Publisher abstract.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Role-Based Access Control; Contents vii; Preface xv; Acknowledgements xvii; Chapter 1 Introduction 1; Chapter 2 Access Control Policy, Models, and Mechanisms -- Concepts and Examples 27; Chapter 3 Core RBAC Features 51; Chapter 4 Role Hierachies 67; Chapter 5 SoD and Constraints in RBAC Systems 91; Chapter 6 RBAC, MAC, and DAC 121; Chapter 7 NIST's Proposed RBAC Standard 141; Chapter 8 Role-Based Administration of RBAC 155; Chapter 9 Enterprise Access Control Framework Using RBAC and XML Technologies 179; Chapter 10 Integrating RBAC with Enterprise IT Infrastructures 211</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 11 Migrating to RBAC -- Case Study: Multiline Insurance Company 255Chapter 12 RBAC Features in Commercial Products 265; References 293; Appendix A 295; Appendix B 299; About the authors 303; Index 305</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029553</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2007008424</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kuhn, D. Richard.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chandramouli, Ramaswamy.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Ferraiolo, David.</subfield><subfield code="t">Role-based access control.</subfield><subfield code="d">Boston : Artech House, ©2003</subfield><subfield code="z">1580533701</subfield><subfield code="w">(DLC) 2003041492</subfield><subfield code="w">(OCoLC)51518423</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House computer security series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no00015115</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=87740</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH20049959</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00004018</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker & Taylor</subfield><subfield code="b">BKTY</subfield><subfield code="c">85.00</subfield><subfield code="d">85.00</subfield><subfield code="i">1580533701</subfield><subfield code="n">0004134192</subfield><subfield code="s">active</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL227631</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">87740</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">IEEE</subfield><subfield code="b">IEEE</subfield><subfield code="n">9106075</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2358582</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm52751639 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:26Z |
institution | BVB |
isbn | 1580533248 9781580533249 1580533701 9781580533706 |
language | English |
oclc_num | 52751639 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvii, 316 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Artech House, |
record_format | marc |
series | Artech House computer security series. |
series2 | Artech House computer security series |
spelling | Ferraiolo, David. Role-based access control / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli. Boston : Artech House, ©2003. 1 online resource (xvii, 316 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Artech House computer security series Includes bibliographical references and index. Print version record. Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer RBAC in a networked environment and how to integrate it with existing infrastructure. Publisher abstract. Role-Based Access Control; Contents vii; Preface xv; Acknowledgements xvii; Chapter 1 Introduction 1; Chapter 2 Access Control Policy, Models, and Mechanisms -- Concepts and Examples 27; Chapter 3 Core RBAC Features 51; Chapter 4 Role Hierachies 67; Chapter 5 SoD and Constraints in RBAC Systems 91; Chapter 6 RBAC, MAC, and DAC 121; Chapter 7 NIST's Proposed RBAC Standard 141; Chapter 8 Role-Based Administration of RBAC 155; Chapter 9 Enterprise Access Control Framework Using RBAC and XML Technologies 179; Chapter 10 Integrating RBAC with Enterprise IT Infrastructures 211 Chapter 11 Migrating to RBAC -- Case Study: Multiline Insurance Company 255Chapter 12 RBAC Features in Commercial Products 265; References 293; Appendix A 295; Appendix B 299; About the authors 303; Index 305 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer security. Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Ordinateurs Accès Contrôle. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Access control fast Computer security fast Computers Access control fast Kuhn, D. Richard. Chandramouli, Ramaswamy. Print version: Ferraiolo, David. Role-based access control. Boston : Artech House, ©2003 1580533701 (DLC) 2003041492 (OCoLC)51518423 Artech House computer security series. http://id.loc.gov/authorities/names/no00015115 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=87740 Volltext |
spellingShingle | Ferraiolo, David Role-based access control / Artech House computer security series. Role-Based Access Control; Contents vii; Preface xv; Acknowledgements xvii; Chapter 1 Introduction 1; Chapter 2 Access Control Policy, Models, and Mechanisms -- Concepts and Examples 27; Chapter 3 Core RBAC Features 51; Chapter 4 Role Hierachies 67; Chapter 5 SoD and Constraints in RBAC Systems 91; Chapter 6 RBAC, MAC, and DAC 121; Chapter 7 NIST's Proposed RBAC Standard 141; Chapter 8 Role-Based Administration of RBAC 155; Chapter 9 Enterprise Access Control Framework Using RBAC and XML Technologies 179; Chapter 10 Integrating RBAC with Enterprise IT Infrastructures 211 Chapter 11 Migrating to RBAC -- Case Study: Multiline Insurance Company 255Chapter 12 RBAC Features in Commercial Products 265; References 293; Appendix A 295; Appendix B 299; About the authors 303; Index 305 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer security. Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Ordinateurs Accès Contrôle. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Access control fast Computer security fast Computers Access control fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029553 http://id.loc.gov/authorities/subjects/sh2007008424 |
title | Role-based access control / |
title_auth | Role-based access control / |
title_exact_search | Role-based access control / |
title_full | Role-based access control / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli. |
title_fullStr | Role-based access control / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli. |
title_full_unstemmed | Role-based access control / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli. |
title_short | Role-based access control / |
title_sort | role based access control |
topic | Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer security. Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Ordinateurs Accès Contrôle. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Access control fast Computer security fast Computers Access control fast |
topic_facet | Computers Access control. Computer security. Computer networks Access control. Ordinateurs Accès Contrôle. Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Access control Computer security Computers Access control |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=87740 |
work_keys_str_mv | AT ferraiolodavid rolebasedaccesscontrol AT kuhndrichard rolebasedaccesscontrol AT chandramouliramaswamy rolebasedaccesscontrol |