Share This Author
Role-Based Access Control Models
Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Role-based access control: a multi-dimensional view
- R. Sandhu, E. Coyne, H. Feinstein, C. E. Youman
- Computer ScienceTenth Annual Computer Security Applications…
- 5 December 1994
A vision is laid out on how to approach a common understanding of RBAC, and a first cut is taken at identifying the dimensions ofRBAC, which envisage each dimension as being linearly ordered with respect to the sophistication of features provided.
A Three Tier Architecture for Role-Based Access Control
A reference architecture (or conceptual framework) for the speci cation and enforcement of role-based access control (RBAC), which has three tiers in loose analogy to the well-known ANSI/SPARC architecture for database systems.
RolemBased Access Control Models
Analysis of DAC MAC RBAC Access Control based Models for Security
Access Control is the process or mechanism for giving the authority to access the specific resources, applications and system to the end users according to the system administrator wishes.
4.2 the Directive Manager 4.3 User Interface Agents Nurseunit Nurse Nurse Patient Patient Patient Patient Medical Doctor Medical Doctor Objchart Medical Doctor Patient Nurse Nurseunit
The whole system was designed and implemented in a very short time by using three high-level components: ObjChart as a coordination and communication manager, CLP(R) as a logic-based deductive system for reasoning purposes and workkow for graphical user interface and frontend capabilities.