Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Role-Based Access Control (RBAC)

Handbook of Research on Business Process Modeling
Access control decisions are often based on the roles individual users take on as part of an organization. A role describes a set of transactions that a user or set of users can perform within the context of an organization. RBAC provide a means of naming and describing relationships between individuals and rights, providing a method of meeting the secure processing needs of many commercial and civilian government organizations (Ferraiolo et al., 1999).
Published in Chapter:
Modeling Process-Driven SOAs: A View-Based Approach
Huy Tran (Vienna University of Technology, Austria), Ta’id Holmes (Vienna University of Technology, Austria), Uwe Zdun (Vienna University of Technology, Austria), and Schahram Dustdar (Vienna University of Technology, Austria)
Copyright: © 2009 |Pages: 22
DOI: 10.4018/978-1-60566-288-6.ch002
This chapter introduces a view-based, model-driven approach for process-driven, service-oriented architectures. A typical business process consists of numerous tangled concerns, such as the process control flow, service invocations, fault handling, transactions, and so on. Our view-based approach separates these concerns into a number of tailored perspectives at different abstraction levels. On the one hand, the separation of process concerns helps reducing the complexity of process development by breaking a business process into appropriate architectural views. On the other hand, the separation of levels of abstraction offers appropriately adapted views to stakeholders, and therefore, helps quickly re-act to changes at the business level and at the technical level as well. Our approach is realized as a model-driven tool-chain for business process development.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Modelling of Location-Aware Access Control Rules
If this type of access control is applied then a user can only acquire permissions when he is assigned to a role. “Roles” in that sense represent job descriptions in organizations and are a collection of the necessary permissions a user requires to perform that job. A user can only acquire permissions when he is assigned to a role; it is not allowed to directly assign permissions to a user.
Full Text Chapter Download: US $37.50 Add to Cart
An Integrated Secure Software Engineering Approach for Functional, Collaborative, and Information Concerns
An access control model in which permissions are assigned to roles, which in turn are assigned to users, who get all of the permissions of the assigned roles.
Full Text Chapter Download: US $37.50 Add to Cart
Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration
A method to restrict user’s access to system resources based on the user’s roles. In RBAC, roles are defined based on job functions, permissions are associated with roles, and users are made members of appropriate roles, thereby acquiring the roles’ permissions.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR