語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information flow based security cont...
~
Bischoff, Rainer.
Information flow based security control beyond RBAC[electronic resource] :How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8
書名/作者:
Information flow based security control beyond RBAC : How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) // by Klaus-Peter Fischer-Hellmann.
作者:
Fischer-Hellmann, Klaus-Peter.
其他作者:
Bischoff, Rainer.
出版者:
Wiesbaden : : Springer Fachmedien Wiesbaden :, 2012.
面頁冊數:
159 p. : : ill., digital ;; 25 cm.
Contained By:
Springer eBooks
標題:
Computer networks - Access control.
標題:
Flow control (Data transmission systems)
標題:
BPEL (Computer program language)
標題:
Management information systems.
標題:
Computer Science.
標題:
Systems and Data Security.
標題:
Data Structures.
標題:
Coding and Information Theory.
ISBN:
9783834826183 (electronic bk.)
ISBN:
9783834826176 (paper)
電子資源:
http://dx.doi.org/10.1007/978-3-8348-2618-3
Information flow based security control beyond RBAC[electronic resource] :How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
Fischer-Hellmann, Klaus-Peter.
Information flow based security control beyond RBAC
How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /[electronic resource] :by Klaus-Peter Fischer-Hellmann. - Wiesbaden :Springer Fachmedien Wiesbaden :2012. - 159 p. :ill., digital ;25 cm. - Corporate IT. - Corporate IT..
ISBN: 9783834826183 (electronic bk.)Subjects--Topical Terms:
445512
Computer networks
--Access control.
LC Class. No.: TK5105.597 / .F57 2012
Dewey Class. No.: 005.8
Information flow based security control beyond RBAC[electronic resource] :How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
LDR
:00970nam a2200265 a 4500
001
372326
003
DE-He213
005
20121214090041.0
006
m d
007
cr nn 008maaau
008
130108s2012 gw s 0 eng d
020
$a
9783834826183 (electronic bk.)
020
$a
9783834826176 (paper)
035
$a
978-3-8348-2618-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.597
$b
.F57 2012
082
0 4
$a
005.8
$2
23
090
$a
TK5105.597
$b
.F529 2012
100
1
$a
Fischer-Hellmann, Klaus-Peter.
$3
490542
245
1 0
$a
Information flow based security control beyond RBAC
$h
[electronic resource] :
$b
How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
$c
by Klaus-Peter Fischer-Hellmann.
260
$a
Wiesbaden :
$b
Springer Fachmedien Wiesbaden :
$b
Imprint: Springer Vieweg,
$c
2012.
300
$a
159 p. :
$b
ill., digital ;
$c
25 cm.
490
1
$a
Corporate IT
650
0
$a
Computer networks
$x
Access control.
$3
445512
650
0
$a
Flow control (Data transmission systems)
$3
490545
650
0
$a
BPEL (Computer program language)
$3
341441
650
0
$a
Management information systems.
$3
336744
650
1 4
$a
Computer Science.
$3
423143
650
2 4
$a
Systems and Data Security.
$3
466229
650
2 4
$a
Data Structures.
$3
467911
650
2 4
$a
Coding and Information Theory.
$3
465532
700
1
$a
Bischoff, Rainer.
$3
490543
710
2
$a
SpringerLink (Online service)
$3
463450
773
0
$t
Springer eBooks
830
0
$a
Corporate IT.
$3
490544
856
4 0
$u
http://dx.doi.org/10.1007/978-3-8348-2618-3
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-3-8348-2618-3
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入