38,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
19 °P sammeln
  • Broschiertes Buch

The outcomes of this research will be used to enforce TELECOM OPERATOR s security requirement by designing an appropriate access control model that employ RBAC model by tailoring to specified security requirement. The primary beneficiary of this work will be the TELECOM OPERATORs to enforce their security requirements related to the CCB system. The study will also benefit OPERATORs to develop an access control model for other similar application system such as Finance System, Human Resource System by taking the experience gained from this case study. Developers can also use this study to…mehr

Produktbeschreibung
The outcomes of this research will be used to enforce TELECOM OPERATOR s security requirement by designing an appropriate access control model that employ RBAC model by tailoring to specified security requirement. The primary beneficiary of this work will be the TELECOM OPERATORs to enforce their security requirements related to the CCB system. The study will also benefit OPERATORs to develop an access control model for other similar application system such as Finance System, Human Resource System by taking the experience gained from this case study. Developers can also use this study to develop access control mechanisms and incorporate the model into application system by enhancing this study.
Autorenporträt
Implementing the appropriate Access Control Model is a key activity, for success, in managing and administering the complex IT systems to keep the information resource from unauthorized access.