About 172 results
Open links in new tab
  1. Role Based Access Control | CSRC

    Nov 21, 2016 · Role based access control (RBAC) (also called "role based security"), as formalized in 1992 by David Ferraiolo and Rick Kuhn, has become the predominant model for advanced access …

  2. Role Based Access Control | CSRC

    Nov 21, 2016 · Core RBAC defines a minimum collection of RBAC elements, element sets, and relations in order to completely achieve a Role-Based Access Control system. This includes user-role …

  3. MAC mechanisms assign a security level to all information, assign a security clearance to each user, and ensure that all users only have access to that data for which they have a clearance.

  4. Role Based Access Control | CSRC

    Nov 21, 2016 · RBAC is being used to secure the networks and applications that control power plants, manufaturing facilities, and other process control systems. These activities were initiated in 2004 and …

  5. Role Based Access Control | CSRC

    Nov 21, 2016 · A Case Study in Access Control Requirements for a Health Information System - "a detailed examination of the access constraints for a small real-world Health Information System with …

  6. Proposed NIST Standard for Role-Based Access Control

    Aug 1, 2001 · In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are …

  7. Role-Based Access Control (2nd ed.) | CSRC

    Jan 31, 2007 · This newly revised edition of 'Role-Based Access Control' offers the latest details on a security model aimed at reducing the cost and complexity of security administration for large …

  8. Role Based Access Control (RBAC) Presentation | CSRC

    Nov 23, 2016 · Parent Project See: Role Based Access Control Created November 23, 2016, Updated March 03, 2025

  9. Dec 18, 2000 · Core RBAC defines a minimum collection of RBAC elements, element sets, and relations in order to completely achieve a Role-Based Access Control system. This includes user-role …

  10. Identity & Access Management | CSRC

    Sep 30, 2022 · A NIST research team created, and introduced in 1992, a new approach to controlling user access called Role-Based Access Control (RBAC). What was most striking about RBAC was its …