Role-based access control models
Abstract
Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework of four reference models developed to better understand RBAC and categorizes different implementations, and discusses the use of RBAC to manage itself.
- Publication:
-
Computer
- Pub Date:
- February 1996
- DOI:
- Bibcode:
- 1996Compr..29b..38S
- Keywords:
-
- Access control;
- Permission;
- Data security;
- Software systems;
- Authorization;
- Resource management;
- NIST;
- Government;
- Privacy;
- Telephony