Proposed NIST standard for role-based access control

@article{Ferraiolo2001ProposedNS,
  title={Proposed NIST standard for role-based access control},
  author={David F. Ferraiolo and Ravi S. Sandhu and Serban I. Gavrila and D. Richard Kuhn and Ramaswamy Chandramouli},
  journal={ACM Trans. Inf. Syst. Secur.},
  year={2001},
  volume={4},
  pages={224-274}
}
In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative definition of RBAC exists today. This lack of a widely accepted model results in uncertainty and confusion about RBAC's utility and meaning. The standard proposed here seeks to resolve this situation by… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 1,621 CITATIONS, ESTIMATED 84% COVERAGE

Systematic Assessment of the Impact of User Roles on Network Flow Patterns

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

ACCESS CONTROL PROGRAMMING LIBRARY AND EXPLORATION SYSTEM

VIEW 15 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Medical Data Privacy Handbook

  • Springer International Publishing
  • 2015
VIEW 24 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Multidimensional Context Awareness in Mobile Devices

  • MMM
  • 2015
VIEW 13 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2001
2019

CITATION STATISTICS

  • 341 Highly Influenced Citations

  • Averaged 43 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-9 OF 9 REFERENCES

The NIST model for role-based access control: towards a unified standard

  • ACM Workshop on Role-Based Access Control
  • 2000
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Role Activation Hierarchies

  • ACM Workshop on Role-Based Access Control
  • 1998
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Role-Based Access Control

  • Advances in Computers
  • 1994
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

The Chinese Wall security policy

  • Proceedings. 1989 IEEE Symposium on Security and Privacy
  • 1989
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A Comparison of Commercial and Military Computer Security Policies

  • 1987 IEEE Symposium on Security and Privacy
  • 1987
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL