Role-Based Access Control Models
Computer
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Role mining - revealing business roles for security administration using data mining technology
Proceedings of the eighth ACM symposium on Access control models and technologies
Hi-index | 0.00 |
The importance of high level management of complex information systems, extending over several heterogeneous and geographically distributed computing platforms, is rapidly increasing. The design of a comprehensive and enterprise-wide security strategy, including the efficient administration of large user groups while maintaining the access rights of tens of thousands of users, is next to impossible without support from sophisticated and powerful software toolsets. In this paper we highlight some applications of the software product Security Administration Manager (SAM). With SAM, the staff responsible for security administration has at its disposal an object-oriented tool to monitor the security management of a complex IS-environment.