Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information flow based security cont...
~
Fischer-Hellmann, Klaus-Peter.{me_controlnum}
Linked to FindBook
Google Book
Amazon
博客來
Information flow based security control beyond RBAC = How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information flow based security control beyond RBAC/ by Klaus-Peter Fischer-Hellmann.
Reminder of title:
How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
Author:
Fischer-Hellmann, Klaus-Peter.{me_controlnum}
other author:
Bischoff, Rainer.
Published:
Wiesbaden :Springer Fachmedien Wiesbaden : : 2012.,
Description:
159 p. :ill., digital ;25 cm.
Contained By:
Springer eBooks
Subject:
Computer networks - Access control. -
Online resource:
http://dx.doi.org/10.1007/978-3-8348-2618-3
ISBN:
9783834826183 (electronic bk.)
Information flow based security control beyond RBAC = How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
Fischer-Hellmann, Klaus-Peter.{me_controlnum}
Information flow based security control beyond RBAC
How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /[electronic resource] :by Klaus-Peter Fischer-Hellmann. - Wiesbaden :Springer Fachmedien Wiesbaden :2012. - 159 p. :ill., digital ;25 cm. - Corporate IT. - Corporate IT..
ISBN: 9783834826183 (electronic bk.)Subjects--Topical Terms:
729719
Computer networks
--Access control.
LC Class. No.: TK5105.597 / .F57 2012
Dewey Class. No.: 005.8
Information flow based security control beyond RBAC = How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
LDR
:00970nmm a2200265 a 4500
001
1329368
003
DE-He213
005
20121214090041.0
006
m d
007
cr nn 008maaau
008
130207s2012 gw s 0 eng d
020
$a
9783834826183 (electronic bk.)
020
$a
9783834826176 (paper)
035
$a
978-3-8348-2618-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.597
$b
.F57 2012
082
0 4
$a
005.8
$2
23
090
$a
TK5105.597
$b
.F529 2012
100
1
$a
Fischer-Hellmann, Klaus-Peter.{me_controlnum}
$3
1621181
245
1 0
$a
Information flow based security control beyond RBAC
$h
[electronic resource] :
$b
How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
$c
by Klaus-Peter Fischer-Hellmann.
260
$a
Wiesbaden :
$b
Springer Fachmedien Wiesbaden :
$b
Imprint: Springer Vieweg,
$c
2012.
300
$a
159 p. :
$b
ill., digital ;
$c
25 cm.
490
1
$a
Corporate IT
650
0
$a
Computer networks
$x
Access control.
$3
729719
650
0
$a
Flow control (Data transmission systems)
$3
1621184
650
0
$a
BPEL (Computer program language)
$3
1621185
650
0
$a
Management information systems.
$3
528143
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Data Structures.
$3
891009
650
2 4
$a
Coding and Information Theory.
$3
891252
700
1
$a
Bischoff, Rainer.
$3
1621182
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Corporate IT.
$3
1621183
856
4 0
$u
http://dx.doi.org/10.1007/978-3-8348-2618-3
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9151761
電子資源
11.線上閱覽_V
電子書
EB TK5105.597 .F57 2012
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login