Innovative Solutions for Access Control Management

Innovative Solutions for Access Control Management

Copyright: © 2016 |Pages: 330
ISBN13: 9781522504481|ISBN10: 1522504486|EISBN13: 9781522504498
DOI: 10.4018/978-1-5225-0448-1
Cite Book Cite Book

MLA

Malik, Ahmad Kamran, et al., editors. Innovative Solutions for Access Control Management. IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0448-1

APA

Malik, A. K., Anjum, A., & Raza, B. (Eds.). (2016). Innovative Solutions for Access Control Management. IGI Global. https://doi.org/10.4018/978-1-5225-0448-1

Chicago

Malik, Ahmad Kamran, Adeel Anjum, and Basit Raza, eds. Innovative Solutions for Access Control Management. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0448-1

Export Reference

Mendeley
Favorite Full-Book Download

Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user’s information.

Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Access control models and techniques for different collaborative environments are presented in each chapter. It starts with a survey on access control techniques for social networks. Rest of the chapters mostly use Role-based Access...
Access Control for Collaborative Environments
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
This section contains miscellaneous topic related to security and access control. Access control requirement for mobile computing, Cloud services access, and usage models are presented. In the end, network and hardware level security...
Mobile, Cloud, and Network Security
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.