Publication | Closed Access
Role-based access control models
5.8K
Citations
8
References
1996
Year
EngineeringInformation SecuritySoftware EngineeringHardware SecurityLogical Access ControlAccess ControlManagementSystems EngineeringSecurity ControlReference ModelsComputer EngineeringComputer ScienceInformation ManagementSecurity AdministrationSoftware DesignData SecurityLarge SystemsSecuritySystem SoftwareComputer Security ModelModel-driven Security
Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework of four reference models developed to better understand RBAC and categorizes different implementations, and discusses the use of RBAC to manage itself.
| Year | Citations | |
|---|---|---|
Page 1
Page 1