skip to content
Role-based access control Preview this item
ClosePreview this item
Checking...

Role-based access control

Author: David Ferraiolo; Ramaswamy Chandramouli; D Richard Kuhn
Publisher: Boston : Artech House, ©2007.
Series: Artech House information security and privacy series.
Edition/Format:   eBook : Document : English : 2nd ed
Summary:
This newly revised edition of the Artech House bestseller, Role-Based Access Control, offers you the very latest details on this sophisticated security model aimed at reducing the cost and complexity of security administration for large networked applications. The second edition provides more comprehensive and updated coverage of access control models, new RBAC standards, new in-depth case studies and discussions on  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Ferraiolo, David.
Role-based access control.
Boston : Artech House, ©2007
(DLC) 2007274360
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: David Ferraiolo; Ramaswamy Chandramouli; D Richard Kuhn
ISBN: 9781596931145 1596931140 9781596932074 1596932074
OCLC Number: 427509709
Reproduction Notes: Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL
Description: 1 online resource (xix, 381 pages) : illustrations.
Details: Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Contents: Section I: Access Control Concepts & RBAC? Introduction.; Access Control Definitions and Enforcement Framework.; Section II: RBAC Framework: Models & Contraints? Core RBAC Features.; Role Hierarchies.; SoD and Constraints in RBAC Systems.; RBAC, MAC and DAC.; RBAC and Privacy.; Section III: RBAC Standardization? RBAC Standards.; Section IV: Enterprise Security Administration in RBAC? Role-Based Administration of RBAC.; Role Engineering.; Enterprise Access Control Frameworks Using RBAC and XML Technologies.; Section V: RBAC in IT Systems Applications? Integrating RBAC with Enterprise IT Infrastructures.; RBAC Implementation Case Studies.; RBAC Features in Commerical Products.; Appendices.; About the Authors.; Index.
Series Title: Artech House information security and privacy series.
Responsibility: David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.

Abstract:

Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/427509709> # Role-based access control
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "427509709" ;
    library:placeOfPublication <http://dbpedia.org/resource/Boston> ; # Boston
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=338751";target="_blank'" ;
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computers_access_control> ; # Computers--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/2918217608#Topic/securite_informatique> ; # Sécurité informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/2918217608#Topic/rollenbasierte_zugriffskontrolle> ; # Rollenbasierte Zugriffskontrolle
    schema:about <http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://id.loc.gov/authorities/subjects/sh85029553> ; # Computers--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computer_networks_access_control> ; # Computer networks--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://id.loc.gov/authorities/subjects/sh2007008424> ; # Computer networks--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computersicherheit> ; # Computersicherheit
    schema:bookEdition "2nd ed." ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/75301472> ; # D Richard Kuhn
    schema:contributor <http://viaf.org/viaf/16595624> ; # Ramaswamy Chandramouli
    schema:copyrightYear "2007" ;
    schema:creator <http://viaf.org/viaf/18851806> ; # David Ferraiolo
    schema:datePublished "2007" ;
    schema:description "This newly revised edition of the Artech House bestseller, Role-Based Access Control, offers you the very latest details on this sophisticated security model aimed at reducing the cost and complexity of security administration for large networked applications. The second edition provides more comprehensive and updated coverage of access control models, new RBAC standards, new in-depth case studies and discussions on role engineering and the design of role-based systems. The book shows you how RBAC simplifies security administration by using roles, hierarchies, and constraints to manage the review and control of organizational privileges. Moreover, it explains how RBAC makes it possible to specify many types of enterprise security policies. This unique resource covers all facets of RBAC, from its solid model-theoretic foundations to its implementation within commercial products. You learn how to use RBAC to emulate other access control models and find frameworks and tools for administering RBAC. Research prototypes that have incorporated RBAC into various classes of software like WFMS, Web server, OS (Unix) and Java (JEE) are reviewed. Products implementing RBAC features such as relational DBMS and Enterprise Security Administration (ESA) systems are described to serve as a guide to the state of practice of RBAC."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/2918217608> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2918217608#Series/artech_house_information_security_and_privacy_series> ; # Artech House information security and privacy series.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/2918217608#CreativeWork/role_based_access_control> ;
    schema:name "Role-based access control"@en ;
    schema:productID "427509709" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/427509709#PublicationEvent/boston_artech_house_2007> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/2918217608#Agent/artech_house> ; # Artech House
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225180> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=27197> ;
    schema:url <http://books.google.com/books?id=--BQAAAAMAAJ> ;
    schema:url <https://cornell-library.skillport.com/skillportfe/main.action?assetid=27197> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=338751> ;
    schema:url <http://us.artechhouse.com/CloudPublish/book.aspx?isbn=9781596931145> ;
    schema:url <http://site.ebrary.com/id/10240793> ;
    schema:url "http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=338751";target="_blank" ;
    schema:url <http://catalog.hathitrust.org/api/volumes/oclc/85851304.html> ;
    schema:workExample <http://worldcat.org/isbn/9781596932074> ;
    schema:workExample <http://worldcat.org/isbn/9781596931145> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/427509709> ;
    .


Related Entities

<http://dbpedia.org/resource/Boston> # Boston
    a schema:Place ;
    schema:name "Boston" ;
    .

<http://experiment.worldcat.org/entity/work/data/2918217608#Series/artech_house_information_security_and_privacy_series> # Artech House information security and privacy series.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/427509709> ; # Role-based access control
    schema:name "Artech House information security and privacy series." ;
    schema:name "Artech House information security and privacy series" ;
    .

<http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computer_networks_access_control> # Computer networks--Access control
    a schema:Intangible ;
    schema:name "Computer networks--Access control"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computers_access_control> # Computers--Access control
    a schema:Intangible ;
    schema:name "Computers--Access control"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2918217608#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2918217608#Topic/rollenbasierte_zugriffskontrolle> # Rollenbasierte Zugriffskontrolle
    a schema:Intangible ;
    schema:name "Rollenbasierte Zugriffskontrolle"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2918217608#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
    schema:name "Sécurité informatique"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2007008424> # Computer networks--Access control
    a schema:Intangible ;
    schema:name "Computer networks--Access control"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029553> # Computers--Access control
    a schema:Intangible ;
    schema:name "Computers--Access control"@en ;
    .

<http://us.artechhouse.com/CloudPublish/book.aspx?isbn=9781596931145>
    rdfs:comment "Artech ebook collection. UCB Access." ;
    .

<http://viaf.org/viaf/16595624> # Ramaswamy Chandramouli
    a schema:Person ;
    schema:familyName "Chandramouli" ;
    schema:givenName "Ramaswamy" ;
    schema:name "Ramaswamy Chandramouli" ;
    .

<http://viaf.org/viaf/18851806> # David Ferraiolo
    a schema:Person ;
    schema:familyName "Ferraiolo" ;
    schema:givenName "David" ;
    schema:name "David Ferraiolo" ;
    .

<http://viaf.org/viaf/75301472> # D Richard Kuhn
    a schema:Person ;
    schema:familyName "Kuhn" ;
    schema:givenName "D. Richard" ;
    schema:name "D Richard Kuhn" ;
    .

<http://worldcat.org/entity/work/data/2918217608#CreativeWork/role_based_access_control>
    a schema:CreativeWork ;
    rdfs:label "Role-based access control." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/427509709> ; # Role-based access control
    .

<http://worldcat.org/isbn/9781596931145>
    a schema:ProductModel ;
    schema:isbn "1596931140" ;
    schema:isbn "9781596931145" ;
    .

<http://worldcat.org/isbn/9781596932074>
    a schema:ProductModel ;
    schema:isbn "1596932074" ;
    schema:isbn "9781596932074" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.