Role mining in business : taming role-based access control administration
Resource Information
The work Role mining in business : taming role-based access control administration represents a distinct intellectual or artistic creation found in University of Liverpool. This resource is a combination of several types including: Work, Language Material, Books.
The Resource
Role mining in business : taming role-based access control administration
Resource Information
The work Role mining in business : taming role-based access control administration represents a distinct intellectual or artistic creation found in University of Liverpool. This resource is a combination of several types including: Work, Language Material, Books.
- Label
- Role mining in business : taming role-based access control administration
- Title remainder
- taming role-based access control administration
- Statement of responsibility
- Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello
- Language
- eng
- Summary
- With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) -- a policy-neutral access control model that serves as a bridge between academia and industry -- is probably the most suitable security model for commercial applications. Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of a
- Cataloging source
- CaPaEBR
- Illustrations
- illustrations
- Index
- index present
- LC call number
- TK5105.59
- LC item number
- .C65 2012eb
- Literary form
- non fiction
- Nature of contents
-
- standards specifications
- bibliography
Context
Context of Role mining in business : taming role-based access control administrationWork of
No resources found
No enriched resources found
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/UlXL9YGT02U/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/UlXL9YGT02U/">Role mining in business : taming role-based access control administration</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Work Role mining in business : taming role-based access control administration
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/UlXL9YGT02U/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/UlXL9YGT02U/">Role mining in business : taming role-based access control administration</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>