Skip to search formSkip to main contentSkip to account menu

Role-based access control

Known as: Role based security, Role-based security, RBAC 
In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are… 
2008
2008
Current access control research follows two parallel themes: many efforts focus on developing novel access control models meeting… 
2007
2007
  • I. Clark
  • 2007
  • Corpus ID: 38454693
Today’s large organization’s information technology (IT) infrastructure is a mix of complex incompatible operating systems… 
2007
2007
  • Sylvia L. Osborn
  • 2007
  • Corpus ID: 7516086
Role-based access control (RBAC) models have been introduced by several groups of researchers. We first introduce the basic… 
2006
2006
Access control is an important measure to secure the information system, but the traditional access control models cannot fully… 
Highly Cited
2005
Highly Cited
2005
The administration of users and access rights in large enterprises is a complex and challenging task. Role-based access control… 
Review
2005
Review
2005
Service oriented architecture (SOA) is an evolution of client/server architecture. A SOA based system can transparently… 
2003
2003
The research work of RBAC is greatly emphasized in recent years. However, the main work focuses on some characters which have… 
Highly Cited
2000
Highly Cited
2000
The essential properties of a simple model for users, groups and group hierarchies for role-based access control, embodied in a… 
1996
1996
Copyright 1996 Association for Computing Machinery. Permission to make digital/hard copy of all or part of this work for personal…