IT Skills Security Access control
Besides a comprehensive survey of role mining techniques deeply rooted in academic research, this practical book also provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.
