Role-based access control
De LibreFind
Advanced search |
- About 7 results found and you can help!
In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC). RBAC is sometimes referred to as role-based security.
- See also: Wikipedia
- Related: AGDLP, Authentication, Blind credential, Chinese wall, Covert channel, Discretionary access control, grsecurity, Identity Driven Networking, Lattice-based access control, NIST RBAC model, PERMIS, Security classification, Security label, Sudo, XACML
FAQ on RBAC models and standards FAQ on RBAC models and standards csrc.nist.gov/rbac/rbac-faq.html - Web |
Role Based Access Controls at NIST Role Based Access Controls at NIST csrc.nist.gov/rbac/ - Web |
XACML core and hierarchical role based access cont... XACML core and hierarchical role based access control profile docs.oasis-open.org/.../access_control-xacml-2.0-rbac-profile1-spec-os.pdf - Web |
Average relevance
Institute for Cyber Security at the University of ... Institute for Cyber Security at the University of Texas San Antonio www.ics.utsa.edu - Web |
Trustifier RoBAC/RuBAC overview Trustifier RoBAC/RuBAC overview www.afcea.org/wiki/index.php?title=Trusted_Computing_Base - Web |
Practical experiences in implementing RBAC Practical experiences in implementing RBAC www.servercare.nl/Lists/Posts/Post.aspx?ID=92 - Web |
Role-based approach to Active Directory delegation Role-based approach to Active Directory delegation www.adaxes.com/active-directory_delegation.htm - Web |