Description:This book has the potential to fill a real void in the Identity and Access Management industry where practical role engineering methods have not be formalized or validated. Role Engineering for Enterprise Security Management (ESM) is an expensive, technical, high risk proposition for corporations and institutions managing tens of thousands of use accounts in an IT environment. There are Identity Management products and vendors whosupport this role-based access control (RBAC) process but no standard methodologies exist for successful ESM implementation. The authors provide a much-needed, how-to, approach for achieving successful Role Engineering in the enterprise network.