role-based access control


Also found in: Medical, Acronyms, Wikipedia.

role-based access control

The identification, authentication and authorization of individuals based on their job titles within an organization. Contrast with mandatory access control and discretionary access control. See least privilege.
References in periodicals archive ?
It optimizes protection rollout for larger virtual machine deployments and simplifies security management across an entire infrastructure -- with a new advanced Security Virtual Machines (SVM) selection algorithm and role-based access control (RBAC) now available through Kaspersky Security Center.
For instants, Jha et al[2] proposed the Temporal Role-Based Access Control (TRBAC), which describe the time factor based RBAC.
The technologies, terminologies and services involved in implementing identity management are Role-Based Access Control (RBAC) and Open Standard of Authorization (OAuth), SAML 2.0, WS-Trust, WS-Security, OPenID, Workflows, Service Token Services, Security Tokens, Single Sign-on, Password Managers, Digital Identities, Access Control, Web Service, Identity Providers and Directory Services.
The research proposed an RBAC role-based access control design that is compatible for cloud storage services and provides an easy-to-use and manageable ABAC mechanism.
Role-based access control helps limit what users can do according to their job requirements, e.g., viewing, modifying, or creating data files and workspaces.
Role-based access control (RBAC) addresses the needs for authorization control over objects and builds up adding the maintenance/administration feature of grouping users that have the same permissions/needs into roles.
Youman, "Role-based access control models," The Computer Journal, vol.
Central to this theme is migrating to a role-based access control (RBAC) model that is dynamic, using short-lived instead or long-lived privileges."
[11] Lan Zhou, Vijay Varadharajan, and Michael Hitchens, "Secure Role-Based Access Control on Encrypted Data in Cloud Storage," IEEE Transactions on Information Forensics and Security, vol.12, 2013.
Security features include - open LDAP, Kerberos, and Active Directory for authentication, Role-based access control for authorization, and encryption of data in motion and rest with SSL, PLS, and AES-256.
The concept of attribute based encryption with threshold signing for providing role-based access control with auditability to prevent misbehavior of intruders in all situations (normal or emergency access).
Rocana Ops 1.6 introduces built-in role-based access control (RBAC) complete with optional integration support for active directory services.