TY - GEN AU - Coyne,Edward J. AU - Davis,John M (jtauth) TI - Role engineering for enterprise security management SN - 9781596932180 U1 - 621 PY - 2008/// CY - Boston PB - Artech House Publishers KW - Computer networking & communications KW - Data security & data encryption KW - Management information systems KW - Technology & Engineering KW - Computers - Computer Security KW - Science/Mathematics KW - Computers / Security / General KW - Information Management KW - Security - General KW - Electricity KW - Access control KW - Computer network architectures KW - Computer networks KW - Information resources management KW - Computer Communications & Networking N1 - HB N2 - Whether you are a manager, engineer, or IT security specialist, this authoritative resource shows you how to define and deploy roles for securing enterprise systems. Written by leading authorities in the field, the book explains how you can build a business case, identify risks, determine project costs, and fully plan and staff a role engineering effort. You find practical techniques that meaningfully define roles and ensure proper assignment of permissions and roles to users. The book presents tools that enable you to capture permissions and user assignments from existing systems, and analyze user and permission data in scenarios simulating actual system use. Moreover, this practical reference helps you evaluate these tools and decide which ones are right for your own role engineering program. The book also shows how to verify that role structures comply with security policies. You find tips and insights from real-world projects that guarantee you engineer roles strategically and securely ER -