role-based access control

(redirected from Role based access control)
Also found in: Medical, Acronyms.

role-based access control

The identification, authentication and authorization of individuals based on their job titles within an organization. Contrast with mandatory access control and discretionary access control. See least privilege.
References in periodicals archive ?
Kuhn, "The NIST model for role based access control: toward a unified standard," in RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control, pp.
The base model (called also the core model) is denoted as [RBAC.sub.0] and defines the minimum and necessary requirements for a system to support role based access control. The hierarchical RBAC, denoted as [RBAC.sub.1], introduces the role-hierarchies construct to [RBAC.sub.0].
Role based access control, or role based security, is the dominant model for advanced access control.
Role Based Access Control (RBAC) provides a better security solution for accessing data on the cloud.
Role based access control (RBAC) model has been widely applied to authorize certain users to access certain data or resources within complex systems [2-6].
Douligeris, "Spatio temporal emergency role based access control (STEM-RBAC): a time and location aware role based access control model with a break the glass mechanism," in Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11), pp.
The service could establish, recombine, destruct, and even inherit efficiently to requested parameters which cannot be satisfied well by traditional access control models, such as the role based access control model [5], where an authorization to the subject could not change parametrically and dynamically with its environment.
Uppal, "Supporting relationships in access control using role based access control," in Proceedings of the 4th ACMWorkshop on Role Based Access Control, pp.
"Multi-domain and Privacy-aware Role Based Access Control in eHealth.
Implemented system operates in multi-storey building, uses location-based authentication, spatial features and role based access control, updates access permitions periodically and evaluates feature type "inzone" (Table I).
More recently, Role Based Access Control (RBAC) models have been defined which allow the first component of access control to be based on the roles played by individuals in the organisations making use of an information system.
The new features - Role Based Access Control, Airlock, and Dynamic Resource Instrumentation - provide increased flexibility, security, and control for cloud-based enterprise applications.