gptkbp:instanceOf
|
Access Control System
|
gptkbp:author
|
gptkb:D._Richard_Kuhn
gptkb:David_F._Ferraiolo
gptkb:Ramaswamy_Chandramouli
|
gptkbp:basisFor
|
gptkb:ANSI_INCITS_359-2004
|
gptkbp:category
|
computer security
information security
access control standard
|
gptkbp:defines
|
constrained RBAC model
core RBAC model
hierarchical RBAC model
symmetrical RBAC model
|
gptkbp:documentType
|
gptkb:NIST_Special_Publication_800-162
|
gptkbp:fullName
|
NIST Role-Based Access Control Standard
|
gptkbp:hasComponent
|
roles
users
permissions
sessions
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST RBAC Standard
|
gptkbp:influenced
|
enterprise security policies
software access control systems
|
gptkbp:publicationYear
|
2000
|
gptkbp:publishedBy
|
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:usedFor
|
access control
authorization management
|
gptkbp:website
|
https://csrc.nist.gov/publications/detail/sp/800-162/final
|
gptkbp:bfsParent
|
gptkb:Proposed_NIST_Standard_for_Role-Based_Access_Control
|
gptkbp:bfsLayer
|
8
|