{"title":"角色寻找/角色工程(小组会议)","authors":"Haio Roeckle","doi":"10.1145/344287.344303","DOIUrl":null,"url":null,"abstract":"Role-Engineering is recognized as an important part of the implementation of RBAC in real life organizations. It is therefore an interesting part of the research on RBAC. In the past several years, authors have contributed to the discussion on roleengineering in different environments and with different approaches. In large business companies it is often said the roles are present somewhere within the business organization and need only be found. That's where the expression Role-Finding arose.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"147 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2000-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Role-finding/role-engineering (panel session)\",\"authors\":\"Haio Roeckle\",\"doi\":\"10.1145/344287.344303\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Role-Engineering is recognized as an important part of the implementation of RBAC in real life organizations. It is therefore an interesting part of the research on RBAC. In the past several years, authors have contributed to the discussion on roleengineering in different environments and with different approaches. In large business companies it is often said the roles are present somewhere within the business organization and need only be found. That's where the expression Role-Finding arose.\",\"PeriodicalId\":355233,\"journal\":{\"name\":\"ACM Workshop on Role-Based Access Control\",\"volume\":\"147 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2000-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Workshop on Role-Based Access Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/344287.344303\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Workshop on Role-Based Access Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/344287.344303","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Role-Engineering is recognized as an important part of the implementation of RBAC in real life organizations. It is therefore an interesting part of the research on RBAC. In the past several years, authors have contributed to the discussion on roleengineering in different environments and with different approaches. In large business companies it is often said the roles are present somewhere within the business organization and need only be found. That's where the expression Role-Finding arose.