Definitions

from Wiktionary, Creative Commons Attribution/Share-Alike License.

  • initialism computing Role-based access control

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word RBAC.

Examples

  • B is extremely important, because it represents the result of an authorization process and is easily enforceable by the infrastructure for allowing / disallowing access to resources without requiring explicit attention from the code of the resource itself; in fact, B types are indeed mentioned but somewhat arbitrarily classified as RBAC too.

    MSDN Blogs 2009

  • Federated Identity: Suroop Mohan Chandran and James Joshi did present a good paper on incorporating location and time-based RBAC models but didn't connect it to the real-world problems that corporations face.

    From Incite comes Insight...: Thoughts on the WISE 2005 Conference James McGovern 2005

  • Help came with the creation of Role-Based Access Control (RBAC), in which a person's job function, not name, was the key to accessing a particular file.

    PhysOrg.com - latest science and technology news stories 2010

  • Segregation of Duties • Hypervisor and virtualization infrastructure are new components to manage • Server, storage, network, and security duties are collapsed • Critical considerations: - Role-mapping within IT - RBAC capabilities of virtualization platform -

    Recently Uploaded Slideshows jasonbchan 2010

  • "We didn't invent RBAC, but we wanted to systematize it and standardize it," says Richard

    PhysOrg.com - latest science and technology news stories 2010

  • "While we were working on this, John [Barkley] came up with a way to control access by using RBAC within the context of a lengthy, multistep task, and I suggested he patent it."

    PhysOrg.com - latest science and technology news stories 2010

  • Mapping Business Drivers to Security and Audit Concerns Business Driver Concern • Server consolidation • Criticality of management • Centralized administration infrastructure • Higher server/admin ratio • SoD/RBAC • Quick provisioning • "Physical" access • Simple reconfiguration • Licensing compliance, • Multiple OS on single change management platform •

    Recently Uploaded Slideshows jasonbchan 2010

  • For example, there's also documentation on file formats, system calls and library functions as well as overview documentation on OpenSolaris technologies like RBAC, SMF and Zones.

    Sun Bloggers Brian Leonard 2010

  • Platform Security • Security characteristics and capabilities of your virtualization platform • Software security quality • Resource isolation across VMs - Memory, disk, CPU, network • Resource limits and reservations • Management infrastructure - RBAC, monitoring, remote administration, API

    Recently Uploaded Slideshows jasonbchan 2010

  • In addition, service plans allow you to grant the correct set of RBAC permissions to tenant based on available features.

    Softpedia - Windows - All 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.