Suitable for all academics, IT and business professionals, this book explores role mining algorithms and offers insights into the automated role design approaches proposed in the literature. It provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.
Suitable for all academics, IT and business professionals, this book explores role mining algorithms and offers insights into the automated role desig...
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The 21 revised papers included in the volume were carefully reviewed and selected from 73 submissions. Topics covered include crypto and electronic money; wireless security; web security; intrusion detection and monitoring; and anonymity and privacy.
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2...