
Role Engineering for Enterprise Security Management
List price: US$105.00
Currently unavailable
We can notify you when this item is back in stock
Add to wishlistAbeBooks may have this title (opens in new window).
Try AbeBooksDescription
Role engineering secures information systems. It ensures that every user has the right permission to access just the right information, computers, and networks. When hundred or thousands of computer users must be assigned their own individual access permission, role engineering saves significant time and money while protecting data and systems. This first-of-its-kind book illustrates the entire role engineering process, from project planning to deployment and verification. In addition to explaining technical aspects, the book emphasizes business benefits by showing how to manage risks and costs. Practitioners get proven techniques that define roles and ensure proper assignment of permissions and roles to users. The book also shows how to verify that roles comply with security policies.
show more
show more
Product details
- Hardback | 256 pages
- 162.05 x 236.98 x 17.78mm | 453.59g
- 01 Dec 2007
- Artech House Publishers
- Norwood, United States
- English
- Unabridged
- Unabridged edition
- 159693218X
- 9781596932180
- 3,186,328
Table of contents
The Business Case for Role-Based Access Control. Role Engineering in the Phases of the System Development Life Cycle. Role Engineering and Why We Need It. Staffing for Role Engineering. Defining Good Roles. Two Approaches to Defining Roles. Designing the Roles. Engineering Permissions. Tools that Can Be Used to Assist the Role Engineering Process. Putting It All Together. What Others Have Been Doing. What Can Go Wrong and Why. Planning a Role Engineering Effort.
show more
show more
About Edward Coyne
Edward J. Coyne is a senior security engineer at Science Applications International Corporation in Vienna, Virginia. Among his many professional activities, he is a member of Health Level 7's Security and CCOW Technical committees, chair of the Role-Based Access Control Task Group of the International Committee for Information Technology Standards, and a senior member of the IEEE. John M. Davis is a security architect for the US Department of Veterans Affairs in Encintas, California. He is a voting member of the International Committee for Information Technology Standards.
show more
show more