Definitions

from Wiktionary, Creative Commons Attribution/Share-Alike License.

  • initialism computing Role-based access control

Etymologies

Sorry, no etymologies found.

Examples

  • B is extremely important, because it represents the result of an authorization process and is easily enforceable by the infrastructure for allowing / disallowing access to resources without requiring explicit attention from the code of the resource itself; in fact, B types are indeed mentioned but somewhat arbitrarily classified as RBAC too.

    MSDN Blogs

  • Federated Identity: Suroop Mohan Chandran and James Joshi did present a good paper on incorporating location and time-based RBAC models but didn't connect it to the real-world problems that corporations face.

    From Incite comes Insight...: Thoughts on the WISE 2005 Conference

  • Help came with the creation of Role-Based Access Control (RBAC), in which a person's job function, not name, was the key to accessing a particular file.

    PhysOrg.com - latest science and technology news stories

  • Segregation of Duties • Hypervisor and virtualization infrastructure are new components to manage • Server, storage, network, and security duties are collapsed • Critical considerations: - Role-mapping within IT - RBAC capabilities of virtualization platform -

    Recently Uploaded Slideshows

  • "We didn't invent RBAC, but we wanted to systematize it and standardize it," says Richard

    PhysOrg.com - latest science and technology news stories

  • "While we were working on this, John [Barkley] came up with a way to control access by using RBAC within the context of a lengthy, multistep task, and I suggested he patent it."

    PhysOrg.com - latest science and technology news stories

  • Mapping Business Drivers to Security and Audit Concerns Business Driver Concern • Server consolidation • Criticality of management • Centralized administration infrastructure • Higher server/admin ratio • SoD/RBAC • Quick provisioning • "Physical" access • Simple reconfiguration • Licensing compliance, • Multiple OS on single change management platform •

    Recently Uploaded Slideshows

  • For example, there's also documentation on file formats, system calls and library functions as well as overview documentation on OpenSolaris technologies like RBAC, SMF and Zones.

    Sun Bloggers

  • Platform Security • Security characteristics and capabilities of your virtualization platform • Software security quality • Resource isolation across VMs - Memory, disk, CPU, network • Resource limits and reservations • Management infrastructure - RBAC, monitoring, remote administration, API

    Recently Uploaded Slideshows

  • In addition, service plans allow you to grant the correct set of RBAC permissions to tenant based on available features.

    Softpedia - Windows - All

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.