role-based access control

(redirected from Rbac)
Also found in: Acronyms, Encyclopedia.

role-based access control

An information system that limits the access that NHS staff as a UK facility have to patient care records, including what information can be accessed, how a system user can access it and the system user’s role.
References in periodicals archive ?
Research by [11] has discussed how to build data access control for cloud storage service using RBAC and attribute-based access control (ABAC) that was easy to use and manage.
In the RBAC concept, there is no need to repeat permissions on different groups.
Many works have proposed solutions for access control in cross-organizational collaboration where all organizations adopt the same model (ABAC or RBAC are the most used).
[10.] NIST Computer Security Research Center, "HL7 Role-Based Access Control (RBAC) Role Engineering Process," http://csrc.nist.gov/groups/SNS/rbac/documents/hl7_role-based_access_control_(rbac).pdf accessed Sep.
RBAC is widely used due to its applicability, efficiency and user management provisions.
[10] proposed CP-ABE which is conceptually closer to the traditional access control methods, such as RBAC. CP-ABE scheme attaches access policy in ciphertext instead of attributes of accessors.
Rocana Ops 1.6 introduces built-in role-based access control (RBAC) complete with optional integration support for active directory services.
ABAC is different from other access control models like RBAC because it controls access to information by evaluating rules against attributes of the user and the information, actions allowed, and environmental factors affecting those actions.
Improvements in management and scale, including APIs to expose what resources and actions are available, all filtered by RBAC are included in the new release.
There are different types of access control models, including: Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC) and Cryptographic Access Control (CAC) (Blobel & Pharow 2007; Bouhaddou et al.
One of the most known is Role-Based Access Control (RBAC).
Access control techniques are traditionally subdivided into mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC).