Role Engineering for Enterprise Security Management

Role Engineering for Enterprise Security Management

2.67 (3 ratings by Goodreads)
By (author)  , By (author) 

List price: US$105.00

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks


Role engineering secures information systems. It ensures that every user has the right permission to access just the right information, computers, and networks. When hundred or thousands of computer users must be assigned their own individual access permission, role engineering saves significant time and money while protecting data and systems. This first-of-its-kind book illustrates the entire role engineering process, from project planning to deployment and verification. In addition to explaining technical aspects, the book emphasizes business benefits by showing how to manage risks and costs. Practitioners get proven techniques that define roles and ensure proper assignment of permissions and roles to users. The book also shows how to verify that roles comply with security policies.
show more

Product details

  • Hardback | 256 pages
  • 162.05 x 236.98 x 17.78mm | 453.59g
  • Norwood, United States
  • English
  • Unabridged
  • Unabridged edition
  • 159693218X
  • 9781596932180
  • 3,389,991

Table of contents

The Business Case for Role-Based Access Control. Role Engineering in the Phases of the System Development Life Cycle. Role Engineering and Why We Need It. Staffing for Role Engineering. Defining Good Roles. Two Approaches to Defining Roles. Designing the Roles. Engineering Permissions. Tools that Can Be Used to Assist the Role Engineering Process. Putting It All Together. What Others Have Been Doing. What Can Go Wrong and Why. Planning a Role Engineering Effort.
show more

About Edward Coyne

Edward J. Coyne is a senior security engineer at Science Applications International Corporation in Vienna, Virginia. Among his many professional activities, he is a member of Health Level 7's Security and CCOW Technical committees, chair of the Role-Based Access Control Task Group of the International Committee for Information Technology Standards, and a senior member of the IEEE. John M. Davis is a security architect for the US Department of Veterans Affairs in Encintas, California. He is a voting member of the International Committee for Information Technology Standards.
show more

Rating details

3 ratings
2.67 out of 5 stars
5 0% (0)
4 33% (1)
3 33% (1)
2 0% (0)
1 33% (1)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X