17 books • 2 series
Attribute-Based Access Control
Role-Based Access Control, Second Edition (Artech House Information Security and Privacy)
Role-Based Administration of Rbac
Rbac Standards and Profiles
Core Rbac Features
Enterprise Access Control Frameworks Using Rbac and XML Technologies
Migrating to Rbac-Case Study
Role Engineering
Integrating Rbac with Enterprise It Infrastructures
Privacy and Regulatory Issues
Rbac Features in Commercial Products
Introduction
Rbac, Mac, and Dac
Sod and Constraints in Rbac Systems
Speculative Conclusions
Role Hierarchies
Role-based Access Control (Artech House computer security)