Most organizations at present employ Role Based Access Control (RBAC) model for Information Security, an effective technique to manage user access rights. As RBAC constraints do not consider human factors, such as illness, personnel commitment or social obligation, organizations performance gets affected and also obstructs organization's ability in managing resources. Depending upon the application needs, an RBAC model should be able to support one or more of the following categories of Spatial- temporal constraints; · Spatial-Temporal constraints on roles · Spatial-Temporal constraints on user-role assignments · Spatial-Temporal constraints on user-permission assignments The objective of such categorization is to facilitate secure accessibility into the system during non availability of an authorized user, without tampering organizations access control mechanism. This book demonstrates how to extend the existing RBAC model for Spatial- temporal constraints.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Pradeep Sadanand, is currently working as an Assistant Professor in Department of Computer Science, B.M.S College of Engineering. He has around 9 years of teaching experience. His interests include Web Programming,Windows Programming, Computer networks and Information Security.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 28,91 expédition depuis Royaume-Uni vers France
Destinations, frais et délaisEUR 9,70 expédition depuis Allemagne vers France
Destinations, frais et délaisVendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Sadanand PradeepPradeep Sadanand, is currently working as an Assistant Professor in Department of Computer Science, B.M.S College of Engineering. He has around 9 years of teaching experience. His interests include Web Programming,Win. N° de réf. du vendeur 5497445
Quantité disponible : Plus de 20 disponibles
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Most organizations at present employ Role Based Access Control (RBAC) model for Information Security, an effective technique to manage user access rights. As RBAC constraints do not consider human factors, such as illness, personnel commitment or social obligation, organizations performance gets affected and also obstructs organization's ability in managing resources. Depending upon the application needs, an RBAC model should be able to support one or more of the following categories of Spatial- temporal constraints; Spatial-Temporal constraints on roles Spatial-Temporal constraints on user-role assignments Spatial-Temporal constraints on user-permission assignments The objective of such categorization is to facilitate secure accessibility into the system during non availability of an authorized user, without tampering organizations access control mechanism. This book demonstrates how to extend the existing RBAC model for Spatial- temporal constraints. N° de réf. du vendeur 9783846536353
Quantité disponible : 1 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Most organizations at present employ Role Based Access Control (RBAC) model for Information Security, an effective technique to manage user access rights. As RBAC constraints do not consider human factors, such as illness, personnel commitment or social obligation, organizations performance gets affected and also obstructs organization's ability in managing resources. Depending upon the application needs, an RBAC model should be able to support one or more of the following categories of Spatial- temporal constraints; Spatial-Temporal constraints on roles Spatial-Temporal constraints on user-role assignments Spatial-Temporal constraints on user-permission assignments The objective of such categorization is to facilitate secure accessibility into the system during non availability of an authorized user, without tampering organizations access control mechanism. This book demonstrates how to extend the existing RBAC model for Spatial- temporal constraints. 56 pp. Englisch. N° de réf. du vendeur 9783846536353
Quantité disponible : 2 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. Neuware -Most organizations at present employ Role Based Access Control (RBAC) model for Information Security, an effective technique to manage user access rights. As RBAC constraints do not consider human factors, such as illness, personnel commitment or social obligation, organizations performance gets affected and also obstructs organization's ability in managing resources. Depending upon the application needs, an RBAC model should be able to support one or more of the following categories of Spatial- temporal constraints; Spatial-Temporal constraints on roles Spatial-Temporal constraints on user-role assignments Spatial-Temporal constraints on user-permission assignments The objective of such categorization is to facilitate secure accessibility into the system during non availability of an authorized user, without tampering organizations access control mechanism. This book demonstrates how to extend the existing RBAC model for Spatial- temporal constraints.Books on Demand GmbH, Überseering 33, 22297 Hamburg 56 pp. Englisch. N° de réf. du vendeur 9783846536353
Quantité disponible : 2 disponible(s)
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
paperback. Etat : Like New. Like New. book. N° de réf. du vendeur ERICA80038465363506
Quantité disponible : 1 disponible(s)