Statements (40)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Access Control System
|
gptkbp:abbreviation |
gptkb:RBAC
|
gptkbp:appliesTo |
cloud computing
operating systems databases enterprise systems |
gptkbp:assignee |
permissions to roles
roles to users |
gptkbp:category |
gptkb:government_agency
gptkb:security computer security access control identity management |
gptkbp:contrastsWith |
Discretionary Access Control
Mandatory Access Control |
gptkbp:controls |
permissions
user access |
gptkbp:documentation |
gptkb:ANSI_INCITS_359-2004
|
gptkbp:enables |
compliance
auditability centralized management policy enforcement |
gptkbp:feature |
least privilege
permission authorization role assignment role authorization role hierarchy separation of duties |
gptkbp:firstDescribed |
1992
|
https://www.w3.org/2000/01/rdf-schema#label |
Role-Based Access Control
|
gptkbp:proposedBy |
gptkb:D._Richard_Kuhn
gptkb:David_Ferraiolo gptkb:Ravi_Sandhu |
gptkbp:relatedTo |
gptkb:Policy-Based_Access_Control
Attribute-Based Access Control |
gptkbp:standardizedBy |
gptkb:NIST
|
gptkbp:usedIn |
computer security
information systems |
gptkbp:bfsParent |
gptkb:Access_Control
|
gptkbp:bfsLayer |
5
|