Definitions
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- initialism computing Role-based access control
Etymologies
Sorry, no etymologies found.
Support

Help support Wordnik (and make this page ad-free) by adopting the word RBAC.
Examples
-
B is extremely important, because it represents the result of an authorization process and is easily enforceable by the infrastructure for allowing / disallowing access to resources without requiring explicit attention from the code of the resource itself; in fact, B types are indeed mentioned but somewhat arbitrarily classified as RBAC too.
-
Federated Identity: Suroop Mohan Chandran and James Joshi did present a good paper on incorporating location and time-based RBAC models but didn't connect it to the real-world problems that corporations face.
From Incite comes Insight...: Thoughts on the WISE 2005 Conference
-
Help came with the creation of Role-Based Access Control (RBAC), in which a person's job function, not name, was the key to accessing a particular file.
-
Segregation of Duties • Hypervisor and virtualization infrastructure are new components to manage • Server, storage, network, and security duties are collapsed • Critical considerations: - Role-mapping within IT - RBAC capabilities of virtualization platform -
-
"We didn't invent RBAC, but we wanted to systematize it and standardize it," says Richard
-
"While we were working on this, John [Barkley] came up with a way to control access by using RBAC within the context of a lengthy, multistep task, and I suggested he patent it."
-
Mapping Business Drivers to Security and Audit Concerns Business Driver Concern • Server consolidation • Criticality of management • Centralized administration infrastructure • Higher server/admin ratio • SoD/RBAC • Quick provisioning • "Physical" access • Simple reconfiguration • Licensing compliance, • Multiple OS on single change management platform •
-
For example, there's also documentation on file formats, system calls and library functions as well as overview documentation on OpenSolaris technologies like RBAC, SMF and Zones.
-
Platform Security • Security characteristics and capabilities of your virtualization platform • Software security quality • Resource isolation across VMs - Memory, disk, CPU, network • Resource limits and reservations • Management infrastructure - RBAC, monitoring, remote administration, API
-
In addition, service plans allow you to grant the correct set of RBAC permissions to tenant based on available features.
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.