Skip to search formSkip to main contentSkip to account menu

Role-based access control

Known as: Role based security, Role-based security, RBAC 
In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are… 
2008
2008
Current access control research follows two parallel themes: many efforts focus on developing novel access control models meeting… 
2007
2007
Role based access control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with… 
2006
2006
Access control is an important measure to secure the information system, but the traditional access control models cannot fully… 
2006
2006
This paper analyzes the drawback of role-based access control model that is onerous secure maintenance costs in the systems which… 
Review
2005
Review
2005
Service oriented architecture (SOA) is an evolution of client/server architecture. A SOA based system can transparently… 
2004
2004
This paper analyzes several kinds of access control technique and discusses the RBAC(role-based access control) model and the… 
2003
2003
The research work of RBAC is greatly emphasized in recent years. However, the main work focuses on some characters which have… 
2003
2003
In digital business, the need for efficient frameworks to address the multifaceted security issues related to Web-based… 
2000
2000
Role-Based Access Control (RBAC) is a flexible and policy-neutral access control technology. For large systems, with hundreds of…