Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Role-Based Access Control

Handbook of Research on Security Considerations in Cloud Computing
An approach to restricting system access to authorized users.
Published in Chapter:
Access Control Framework for Cloud Computing
Kashif Munir (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Lawan A. Mohammed (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Copyright: © 2015 |Pages: 12
DOI: 10.4018/978-1-4666-8387-7.ch015
Abstract
Access control is generally a rule or procedure that allows, denies, restricts or limit access to system's resources. It may, as well, monitor and record all attempts made to access a system. Access Control may also identify users attempting to access unauthorized resources. It is a mechanism which is very much important for protection in computer security. Various access control models are in use, including the most common Mandatory Access Control (MAC), Discretionary Access Control (DAC) and Role Based Access Control (RBAC). All these models are known as identity based access control models. In all these access control models, user (subjects) and resources (objects) are identified by unique names. Identification may be done directly or through roles assigned to the subjects. These access control methods are effective in unchangeable distributed system, where there are only a set of Users with a known set of services. For this reason, we propose a framework which is well suited to many situations in cloud computing where users or applications can be clearly separated according to their job functions. In this chapter, we proposes a role based access control framework with various features including security of sensitive data, authorization policy and secure data from hackers. Our proposed role based access control algorithm provides tailored and fine level of user access control services without adding complexity, and supports access privileges updates dynamically when a user's role is added or updated.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Aspect-Oriented Analysis of Security in Distributed Virtual Environment
With the RBAC model, access privileges are associated with roles, and those roles are assigned to real users based on their responsibilities and qualifications.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR