18 books • 1 series
Attribute-Based Access Control
Cryptographic Key Management Issues & Challenges in Cloud Services
Identity & Policy A Common Platform for a Pervasive Policy Paradigm.
Role-Based Administration of Rbac
Rbac Standards and Profiles
Core Rbac Features
Enterprise Access Control Frameworks Using Rbac and XML Technologies
Migrating to Rbac-Case Study
Role Engineering
Integrating Rbac with Enterprise It Infrastructures
Privacy and Regulatory Issues
Rbac Features in Commercial Products
Introduction
Rbac, Mac, and Dac
Sod and Constraints in Rbac Systems
Speculative Conclusions
Role Hierarchies
Role-based Access Control (Artech House computer security)