![]() ![]() Within an organization, roles are created for various job functions. Research in the late 1990s demonstrated that RBAC falls in neither category. ![]() Prior to the development of RBAC, MAC and DAC were considered to be the only known models for access control: if a model was not MAC, it was considered to be a DAC model, and vice versa. Conversely, MAC can simulate RBAC if the role graph is restricted to a tree rather than a partially ordered set. RBAC is a policy neutral and flexible access control technology sufficiently powerful to simulate DAC and MAC. RBAC is sometimes referred to as role-based security. It is a newer alternative approach to mandatory access control (MAC) and discretionary access control (DAC). "Role-Based Access Control (RBAC) is an approach to restricting system access to authorized users. Web2py includes a powerful and customizable Role Based Access Control mechanism (RBAC). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |