Encyclopedia

role-based access control

Also found in: Medical, Acronyms, Wikipedia.

role-based access control

The identification, authentication and authorization of individuals based on their job titles within an organization. Contrast with mandatory access control and discretionary access control. See least privilege.
Copyright © 1981-2025 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
Mentioned in
References in periodicals archive
It optimizes protection rollout for larger virtual machine deployments and simplifies security management across an entire infrastructure -- with a new advanced Security Virtual Machines (SVM) selection algorithm and role-based access control (RBAC) now available through Kaspersky Security Center.
For instants, Jha et al[2] proposed the Temporal Role-Based Access Control (TRBAC), which describe the time factor based RBAC.
The technologies, terminologies and services involved in implementing identity management are Role-Based Access Control (RBAC) and Open Standard of Authorization (OAuth), SAML 2.0, WS-Trust, WS-Security, OPenID, Workflows, Service Token Services, Security Tokens, Single Sign-on, Password Managers, Digital Identities, Access Control, Web Service, Identity Providers and Directory Services.
The research proposed an RBAC role-based access control design that is compatible for cloud storage services and provides an easy-to-use and manageable ABAC mechanism.
Central to this theme is migrating to a role-based access control (RBAC) model that is dynamic, using short-lived instead or long-lived privileges."
[11] Lan Zhou, Vijay Varadharajan, and Michael Hitchens, "Secure Role-Based Access Control on Encrypted Data in Cloud Storage," IEEE Transactions on Information Forensics and Security, vol.12, 2013.
Security features include - open LDAP, Kerberos, and Active Directory for authentication, Role-based access control for authorization, and encryption of data in motion and rest with SSL, PLS, and AES-256.
The concept of attribute based encryption with threshold signing for providing role-based access control with auditability to prevent misbehavior of intruders in all situations (normal or emergency access).
Rocana Ops 1.6 introduces built-in role-based access control (RBAC) complete with optional integration support for active directory services.
Copyright © 2003-2025 Farlex, Inc Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.