Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is RBAC

Improving Security, Privacy, and Trust in Cloud Computing
Role-Based Access Control
Published in Chapter:
Securing Cloud Infrastructure in IaaS and PaaS Environments
Ashok Kumar Nanda (Department of Computer Science and Engineering, B.V. Raju Institute of Technology, India), Abhishek Sharma (Department of Computer Science Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, India), P. John Augustine (Department of Information Technology, Sri Eshwar College of Engineering, India), B. Rex Cyril (Department of Computer Science, St. Joseph's College (Autonomous), India), Venneti Kiran (Department of Computer Science and Engineering (AIML), Aditya College of Engineering, Surampalem, India), and Boopathi Sampath (Mechanical Engineering, Mythayammal Engineering College (Autonomous), India)
Copyright: © 2024 |Pages: 33
DOI: 10.4018/979-8-3693-1431-9.ch001
Abstract
Cloud computing has revolutionized IT infrastructure deployment and management, but it also presents security and resilience challenges. The study delves into the principles and strategies of cloud security to safeguard cloud environments and guarantee business continuity. It explains the concepts of infrastructure as a service (IaaS) and platform as a service (PaaS), their benefits and challenges, and the complex web of security principles within the cloud, including the shared responsibility model, best practices, and identity and access management. The guide explores cloud threats, focusing on common threats and emerging trends. It covers data security, network security measures, and security monitoring. It emphasizes integrating security into DevOps, securing CI/CD pipelines, and infrastructure as code (IaC) security. It covers disaster recovery, business continuity, cloud backup strategies, high availability, and cloud-based solutions, enabling organizations to effectively manage cloud security and resilience.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Hardware Approach for Trusted Access and Usage Control
The Role Bases Access Control Model (RBAC) introduces the concepts of Roles and Teams to improve the administration of access control policies for a large population of cooperating users.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR