Proposed NIST standard for role-based access control
Top Cited Papers
- 1 August 2001
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 4 (3) , 224-274
- https://doi.org/10.1145/501978.501980
Abstract
In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative definition of RBAC exists today. This lack of a widely accepted model results in uncertainty and confusion about RBAC's utility and meaning. The standard proposed here seeks to resolve this situation by unifying ideas from a base of frequently referenced RBAC models, commercial products, and research prototypes. It is intended to serve as a foundation for product development, evaluation, and procurement specification. Although RBAC continues to evolve as users, researchers, and vendors gain experience with its application, we feel the features and components proposed in this standard represent a fundamental and stable set of mechanisms that may be enhanced by developers in further meeting the needs of their customers. As such, this document does not attempt to standardize RBAC features beyond those that have achieved acceptance in the commercial marketplace and research community, but instead focuses on defining a fundamental and stable set of RBAC components. This standard is organized into the RBAC Reference Model and the RBAC System and Administrative Functional Specification. The reference model defines the scope of features that comprise the standard and provides a consistent vocabulary in support of the specification. The RBAC System and Administrative Functional Specification defines functional requirements for administrative operations and queries for the creation, maintenance, and review of RBAC sets and relations, as well as for specifying system level functionality in support of session attribute management and an access control decision process.Keywords
All Related Versions
This publication has 26 references indexed in Scilit:
- Designing data warehouses with OO conceptual modelsComputer, 2001
- Security models for web-based applicationsCommunications of the ACM, 2001
- Role-based authorization constraints specificationACM Transactions on Information and System Security, 2000
- Configuring role-based access control to enforce mandatory and discretionary access control policiesACM Transactions on Information and System Security, 2000
- The ARBAC97 model for role-based administration of rolesACM Transactions on Information and System Security, 1999
- The role graph model and conflict of interestACM Transactions on Information and System Security, 1999
- A role-based access control model and reference implementation within a corporate intranetACM Transactions on Information and System Security, 1999
- Role activation hierarchiesPublished by Association for Computing Machinery (ACM) ,1998
- Role-based access control modelsComputer, 1996
- ProtectionACM SIGOPS Operating Systems Review, 1974