It optimizes protection rollout for larger virtual machine deployments and simplifies security management across an entire infrastructure -- with a new advanced Security Virtual Machines (SVM) selection algorithm and
role-based access control (RBAC) now available through Kaspersky Security Center.
For instants, Jha et al[2] proposed the Temporal
Role-Based Access Control (TRBAC), which describe the time factor based RBAC.
The technologies, terminologies and services involved in implementing identity management are
Role-Based Access Control (RBAC) and Open Standard of Authorization (OAuth), SAML 2.0, WS-Trust, WS-Security, OPenID, Workflows, Service Token Services, Security Tokens, Single Sign-on, Password Managers, Digital Identities, Access Control, Web Service, Identity Providers and Directory Services.
The research proposed an RBAC
role-based access control design that is compatible for cloud storage services and provides an easy-to-use and manageable ABAC mechanism.
Central to this theme is migrating to a
role-based access control (RBAC) model that is dynamic, using short-lived instead or long-lived privileges."
[11] Lan Zhou, Vijay Varadharajan, and Michael Hitchens, "Secure
Role-Based Access Control on Encrypted Data in Cloud Storage," IEEE Transactions on Information Forensics and Security, vol.12, 2013.
Security features include - open LDAP, Kerberos, and Active Directory for authentication,
Role-based access control for authorization, and encryption of data in motion and rest with SSL, PLS, and AES-256.
The concept of attribute based encryption with threshold signing for providing
role-based access control with auditability to prevent misbehavior of intruders in all situations (normal or emergency access).
Rocana Ops 1.6 introduces built-in
role-based access control (RBAC) complete with optional integration support for active directory services.