Role-based access control

Known as: Role based security, Role-based security, Rbac 
In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1974-2017
010020019742017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Merging the best features of RBAC and attribute-based systems can provide effective access control for distributed and rapidly… (More)
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Delegation is often used in administrative models for Role-Based Access Control (RBAC) systems to decentralize administration… (More)
  • figure 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Current approaches to access control on the Web servers do not scale to enterprise-wide systems because they are mostly based on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Role-based access control (RBAC) models are receiving increasing attention as a generalized approach to access control. Roles may… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary… (More)
  • figure 5
  • figure 8
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The basic concept of role-based access control (RBAC) is that permissions are associated with roles, and users are made members… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In this paper, we introduce the notion of TeaM-based Access Control (TMAC) as an approach to applying rolebased access control in… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1996
Highly Cited
1996
This article introduces a family of reference models for rolebased access control (RBAC) in which permissions are associated with… (More)
  • figure 1
  • figure 4
Is this relevant?