Related Books

A Formal Approach to the Role Mining Problem
Language: en
Pages: 203
Authors: Qi Guo
Categories: Computer networks
Type: BOOK - Published: 2010 - Publisher:

DOWNLOAD EBOOK

Role-based access control (RBAC) has become the norm for enforcing security since it has been successfully implemented in various commercial systems. Roles, whi
Role Mining in Business
Language: en
Pages: 295
Authors: Roberto Di Pietro
Categories: Computers
Type: BOOK - Published: 2012 - Publisher: World Scientific

DOWNLOAD EBOOK

With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies
Methodology for Hybrid Role Development
Language: en
Pages: 274
Authors: Ludwig Fuchs
Categories: Business & Economics
Type: BOOK - Published: 2010 - Publisher: BoD – Books on Demand

DOWNLOAD EBOOK

"Cybercrime costs firms USD 1 trillion globally" - Headlines like this released by Reuters news agency on 29th January 2009 tend to regularly dominate internati
Security and Trust Management
Language: en
Pages: 330
Authors: Audun Jøsang
Categories: Computers
Type: BOOK - Published: 2013-04-22 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in
Trusted Systems
Language: en
Pages: 112
Authors: Roderick Bloem
Categories: Computers
Type: BOOK - Published: 2013-11-25 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria