Suitable for all academics, IT and business professionals, this book explores role mining algorithms and offers insights into the automated role design approaches proposed in the literature. It provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.
Suitable for all academics, IT and business professionals, this book explores role mining algorithms and offers insights into the automated role desig...